General

  • Target

    PO#98757.exe

  • Size

    684KB

  • Sample

    200710-21vqn2naqx

  • MD5

    aa40120afe0290b5e7087dfa6e683bd5

  • SHA1

    a7499d3bd4f250c373eb9d3cd13c1bad57a4291e

  • SHA256

    1185a36c1a6d99bb23d9d0b0ece0a927a5ae89aeea3a78bcf30897595dfadc69

  • SHA512

    cd7071c21d5198c4a9365c577d1eb77532230f5d362c6c24b0b5b4205fcb0d9ee1f0cba24ea437c663dae7284a705d1a071ceb74992c1ce2f1b4dfe881c40dbd

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    chinwendu123

Targets

    • Target

      PO#98757.exe

    • Size

      684KB

    • MD5

      aa40120afe0290b5e7087dfa6e683bd5

    • SHA1

      a7499d3bd4f250c373eb9d3cd13c1bad57a4291e

    • SHA256

      1185a36c1a6d99bb23d9d0b0ece0a927a5ae89aeea3a78bcf30897595dfadc69

    • SHA512

      cd7071c21d5198c4a9365c577d1eb77532230f5d362c6c24b0b5b4205fcb0d9ee1f0cba24ea437c663dae7284a705d1a071ceb74992c1ce2f1b4dfe881c40dbd

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks