General

  • Target

    invoice copy.pdf.exe

  • Size

    951KB

  • Sample

    200713-2e5mfk12rs

  • MD5

    3e6acec29c526b5546a5cb38d16c8d04

  • SHA1

    3953b813d92a30446487b02fd1ef1fe96bece8e3

  • SHA256

    b774c08d6cd60de0b59191fe1102105eec3cde3ffab89daeb4faa8a88747e9e5

  • SHA512

    a9e3d6f9cc90aee7119facec54d4fddf52e6eb9a5fe12d13f1f3d01ce6dc8803e0dff62f5f7b3a229bcf6db55cc170ce74bb856d945b9971ec78e477012b85e4

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    chibuikelightwork1

Targets

    • Target

      invoice copy.pdf.exe

    • Size

      951KB

    • MD5

      3e6acec29c526b5546a5cb38d16c8d04

    • SHA1

      3953b813d92a30446487b02fd1ef1fe96bece8e3

    • SHA256

      b774c08d6cd60de0b59191fe1102105eec3cde3ffab89daeb4faa8a88747e9e5

    • SHA512

      a9e3d6f9cc90aee7119facec54d4fddf52e6eb9a5fe12d13f1f3d01ce6dc8803e0dff62f5f7b3a229bcf6db55cc170ce74bb856d945b9971ec78e477012b85e4

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Tasks