General

  • Target

    E410B98888.exe

  • Size

    1.7MB

  • Sample

    200710-lx72nekfx2

  • MD5

    4fb67120185f1f35a4ee966dd8673eb7

  • SHA1

    563837b69516b71eaf64d5bcedf014adbbc45f07

  • SHA256

    184f804223ad564aad94a727a9d58543e2d01a308902c95eb328016739938a90

  • SHA512

    974c0a2e1f41ea34b29fed609ab9765d6d2c5e352263c367078373be1bd9d8a6032cf75e8b0ebf88de6af90df8cc9154a8a1182a43d4804b0bfaeb83adfa3c75

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.ashpraskills.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    TC041018$4321

Targets

    • Target

      E410B98888.exe

    • Size

      1.7MB

    • MD5

      4fb67120185f1f35a4ee966dd8673eb7

    • SHA1

      563837b69516b71eaf64d5bcedf014adbbc45f07

    • SHA256

      184f804223ad564aad94a727a9d58543e2d01a308902c95eb328016739938a90

    • SHA512

      974c0a2e1f41ea34b29fed609ab9765d6d2c5e352263c367078373be1bd9d8a6032cf75e8b0ebf88de6af90df8cc9154a8a1182a43d4804b0bfaeb83adfa3c75

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main Payload

    • AgentTesla Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks