General

  • Target

    32027444.jpg

  • Size

    340KB

  • Sample

    200713-sklhatgqsn

  • MD5

    b5552041f02602b6fa8faa9ccd590ea2

  • SHA1

    21e742f91ab44673f5cc14b82c18f359a127c670

  • SHA256

    3b13bf8c3de862a6914cf5a9eb0539e0046faf3e62e7d2f0fb63001e8dd2b5a3

  • SHA512

    124867cbf5d87fc077ed2537f71f47311064ab64558bf5dac59e27acc8ef3e7f372cf307e90da313ebb8864d246f418f9e45efeefd11a5bd945501ffd0558e9f

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    HYF76io83%$6

Targets

    • Target

      32027444.jpg

    • Size

      340KB

    • MD5

      b5552041f02602b6fa8faa9ccd590ea2

    • SHA1

      21e742f91ab44673f5cc14b82c18f359a127c670

    • SHA256

      3b13bf8c3de862a6914cf5a9eb0539e0046faf3e62e7d2f0fb63001e8dd2b5a3

    • SHA512

      124867cbf5d87fc077ed2537f71f47311064ab64558bf5dac59e27acc8ef3e7f372cf307e90da313ebb8864d246f418f9e45efeefd11a5bd945501ffd0558e9f

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks