General

  • Target

    Specifications Tender Drawings and Technical Data.exe

  • Size

    555KB

  • Sample

    200716-ad82vsd212

  • MD5

    87602c587f1e8a6edfefd4104a779744

  • SHA1

    eaef5987fb405402c829e0675e5933fee638efe7

  • SHA256

    22d92e9b0441722e2eec1d718cfbc78036132d57b15ec9ab1a84170cd1633efe

  • SHA512

    02954edd27a92f366a703972557040b3756811a7bfd1e1972a14b9817617c1e092b40325c7c754cd20a25299633cf4f29657bb353f061e5564d9b4e56fed5244

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.flowtech-eng.net
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    RKZtqmQ*#1

Targets

    • Target

      Specifications Tender Drawings and Technical Data.exe

    • Size

      555KB

    • MD5

      87602c587f1e8a6edfefd4104a779744

    • SHA1

      eaef5987fb405402c829e0675e5933fee638efe7

    • SHA256

      22d92e9b0441722e2eec1d718cfbc78036132d57b15ec9ab1a84170cd1633efe

    • SHA512

      02954edd27a92f366a703972557040b3756811a7bfd1e1972a14b9817617c1e092b40325c7c754cd20a25299633cf4f29657bb353f061e5564d9b4e56fed5244

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks