General

  • Target

    Sinergy Group Order_pdf.exe

  • Size

    545KB

  • Sample

    200716-qas372wr1e

  • MD5

    777efaa4b0dd9ae0a34b5e2fd7626ddb

  • SHA1

    5c0574bf273b4e1d1d39f70993562b347835df85

  • SHA256

    334fcafceb7ca23de3e995d89957290ca49594c51b01929309213be32072d90c

  • SHA512

    794a27d6e80cf5dd2d0ca3129f1ee503daa92d41067f6fbc9acf7eec8c70f09532431ecf68845dd821b080bee32e3dab366013f51300f3e4b96a4974da5703e1

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.chigo-cec.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ?{jbxkcK53}V

Targets

    • Target

      Sinergy Group Order_pdf.exe

    • Size

      545KB

    • MD5

      777efaa4b0dd9ae0a34b5e2fd7626ddb

    • SHA1

      5c0574bf273b4e1d1d39f70993562b347835df85

    • SHA256

      334fcafceb7ca23de3e995d89957290ca49594c51b01929309213be32072d90c

    • SHA512

      794a27d6e80cf5dd2d0ca3129f1ee503daa92d41067f6fbc9acf7eec8c70f09532431ecf68845dd821b080bee32e3dab366013f51300f3e4b96a4974da5703e1

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks