General

  • Target

    aaf02255794de006522a31b1e4a84d23.exe

  • Size

    953KB

  • Sample

    200713-sz5zaxe1xe

  • MD5

    aaf02255794de006522a31b1e4a84d23

  • SHA1

    482d010515aaa7e738ea12e8ec46f59a1004ba27

  • SHA256

    77cd50a78f234331630b2a437f8b01a7cbeee5d74b0ac4f1a2a0399664ca3d00

  • SHA512

    03774bda5cb52cd31f6cb669812aa21da4748288c4f79af47481225b4b61492240109cec973f256489908ba268b8063d66037d4b19ebdbcb1ff707fa0208b95f

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    idahosa1248

Targets

    • Target

      aaf02255794de006522a31b1e4a84d23.exe

    • Size

      953KB

    • MD5

      aaf02255794de006522a31b1e4a84d23

    • SHA1

      482d010515aaa7e738ea12e8ec46f59a1004ba27

    • SHA256

      77cd50a78f234331630b2a437f8b01a7cbeee5d74b0ac4f1a2a0399664ca3d00

    • SHA512

      03774bda5cb52cd31f6cb669812aa21da4748288c4f79af47481225b4b61492240109cec973f256489908ba268b8063d66037d4b19ebdbcb1ff707fa0208b95f

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks