General

  • Target

    swift copy.exe

  • Size

    899KB

  • Sample

    200710-t4z5rsy3e6

  • MD5

    615fdf5bd5f20b021c457478f80b2938

  • SHA1

    73616a95f5ef3fa2f9dc4a258f9ac4ca3b1f80ba

  • SHA256

    4a754cc65487647ffb0067986dd92f27676a61de5f26e9f08130ac8197e44205

  • SHA512

    6d7ade1546ca05a5d319c3cf7332b5a537be4012fc2ffd7862ef6492fa48b1ffa0b91b8e9ba0a2fcc916a663c084aed67b637601e72fbc964c81037ed8456f4a

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    1xH}wgu7}f%E

Targets

    • Target

      swift copy.exe

    • Size

      899KB

    • MD5

      615fdf5bd5f20b021c457478f80b2938

    • SHA1

      73616a95f5ef3fa2f9dc4a258f9ac4ca3b1f80ba

    • SHA256

      4a754cc65487647ffb0067986dd92f27676a61de5f26e9f08130ac8197e44205

    • SHA512

      6d7ade1546ca05a5d319c3cf7332b5a537be4012fc2ffd7862ef6492fa48b1ffa0b91b8e9ba0a2fcc916a663c084aed67b637601e72fbc964c81037ed8456f4a

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Modifies service

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks