General

  • Target

    katel sripted.exe

  • Size

    453KB

  • Sample

    200710-p714mzlg1e

  • MD5

    185fbd39888ad2a14b7080d2ec9b4e6f

  • SHA1

    ea63380570f0df593f43d003b3a0dde27c205efd

  • SHA256

    0ccbeda394779c45187dd20ce04861c0e31f97e805e4c24fc4447601ba195591

  • SHA512

    2a8401db4718a750bbe2724ba9fd274338917790b06324575e1171f297a408509003e8490808aa928ccd540dc0ff99aae825e8e6de2921b41f1155567f9173f6

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.temboventures.co.ke
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ?Tvc@2018

Targets

    • Target

      katel sripted.exe

    • Size

      453KB

    • MD5

      185fbd39888ad2a14b7080d2ec9b4e6f

    • SHA1

      ea63380570f0df593f43d003b3a0dde27c205efd

    • SHA256

      0ccbeda394779c45187dd20ce04861c0e31f97e805e4c24fc4447601ba195591

    • SHA512

      2a8401db4718a750bbe2724ba9fd274338917790b06324575e1171f297a408509003e8490808aa928ccd540dc0ff99aae825e8e6de2921b41f1155567f9173f6

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks