General

  • Target

    2020 Temmuz Ekstreniz.exe

  • Size

    334KB

  • Sample

    200713-lr4dcj786s

  • MD5

    1260d45e5eab7175fce2444dbc9305bb

  • SHA1

    cb01bab71870df40412872429d5a454e2f578ee5

  • SHA256

    8cd6c87a4d6f1e137838ccc3fc75bb90fe86aed076e39c9d987ef20d85b7efd2

  • SHA512

    6289613b5a1772c653e8092e565a3e725ec632449a68a4a7b84d479abc85e562557f1ceeeb201da7479fb555af8d1ee0f4309a5d327eb4a16c807fecf184d358

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ukingzbaba

Targets

    • Target

      2020 Temmuz Ekstreniz.exe

    • Size

      334KB

    • MD5

      1260d45e5eab7175fce2444dbc9305bb

    • SHA1

      cb01bab71870df40412872429d5a454e2f578ee5

    • SHA256

      8cd6c87a4d6f1e137838ccc3fc75bb90fe86aed076e39c9d987ef20d85b7efd2

    • SHA512

      6289613b5a1772c653e8092e565a3e725ec632449a68a4a7b84d479abc85e562557f1ceeeb201da7479fb555af8d1ee0f4309a5d327eb4a16c807fecf184d358

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks