General

  • Target

    Ticari Hesap Özetiniz.exe

  • Size

    859KB

  • Sample

    200710-2wzjbaw58j

  • MD5

    65d91afd6d190c5dfccd0c4b2faa7f76

  • SHA1

    27be872b98d82b2c97616276b246cb3a4a71a27e

  • SHA256

    14a6748757c109080de791b34d158b8e1e7b99831d64bde4d901f5f4ef0a4c20

  • SHA512

    b86c50da567fdf2ab71c958a458b9f21076b742999f2459fb735ef2e453b64a5611272acfcdac5d89dad389f37d5d7f585bcc4a01a13b0e13c9c89f33658376f

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.hospitalveterinariosur.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    HospitalVeterinarioAlSur2018

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.hospitalveterinariosur.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    HospitalVeterinarioAlSur2018

Targets

    • Target

      Ticari Hesap Özetiniz.exe

    • Size

      859KB

    • MD5

      65d91afd6d190c5dfccd0c4b2faa7f76

    • SHA1

      27be872b98d82b2c97616276b246cb3a4a71a27e

    • SHA256

      14a6748757c109080de791b34d158b8e1e7b99831d64bde4d901f5f4ef0a4c20

    • SHA512

      b86c50da567fdf2ab71c958a458b9f21076b742999f2459fb735ef2e453b64a5611272acfcdac5d89dad389f37d5d7f585bcc4a01a13b0e13c9c89f33658376f

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks