General

  • Target

    shipping invoic.pdf.exe

  • Size

    433KB

  • Sample

    200710-7npp95yf26

  • MD5

    2cf842fe3ba47b8dba8804bfb0bf6a2d

  • SHA1

    dc8fde935e8f186d398fe39743e4a78cc163ae04

  • SHA256

    a0fa5e8d28d67d9c239fddc6b9c859eb0ca04275b9ed043adcd9cafbebcb5600

  • SHA512

    622a3d68b9aeeefd4ddfae48cfdcdf18a9134dc13917e3d271b166e41f399346f089dbc63b9ba46547a3f3c797ba68eb2af26e4a84bc19954d9f91e506d33d33

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.ru
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    kingmoney12345

Targets

    • Target

      shipping invoic.pdf.exe

    • Size

      433KB

    • MD5

      2cf842fe3ba47b8dba8804bfb0bf6a2d

    • SHA1

      dc8fde935e8f186d398fe39743e4a78cc163ae04

    • SHA256

      a0fa5e8d28d67d9c239fddc6b9c859eb0ca04275b9ed043adcd9cafbebcb5600

    • SHA512

      622a3d68b9aeeefd4ddfae48cfdcdf18a9134dc13917e3d271b166e41f399346f089dbc63b9ba46547a3f3c797ba68eb2af26e4a84bc19954d9f91e506d33d33

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks