General

  • Target

    Purchase Order.pdf.exe

  • Size

    804KB

  • Sample

    200710-7mg43jktke

  • MD5

    1b02f2f6ea986292e7a8dc776af16856

  • SHA1

    17913bd6f90ac99f55c8bf3f274d6f889cafa1fd

  • SHA256

    661e8315649bab0f2f8f78a31a60935ff0a88d70883db4f1d54024a80f3bc798

  • SHA512

    6789cd591b698eef0ad08bfd27761607a228409a6490b0ba6aef7b3719ef89c50e6561116e4a40482183d162fe8cf913da6e58920738433f8186aa33ddae9d1c

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.sensar-light.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    boss12345@@@@@

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.sensar-light.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    boss12345@@@@@

Targets

    • Target

      Purchase Order.pdf.exe

    • Size

      804KB

    • MD5

      1b02f2f6ea986292e7a8dc776af16856

    • SHA1

      17913bd6f90ac99f55c8bf3f274d6f889cafa1fd

    • SHA256

      661e8315649bab0f2f8f78a31a60935ff0a88d70883db4f1d54024a80f3bc798

    • SHA512

      6789cd591b698eef0ad08bfd27761607a228409a6490b0ba6aef7b3719ef89c50e6561116e4a40482183d162fe8cf913da6e58920738433f8186aa33ddae9d1c

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Tasks