General

  • Target

    544755300977.exe

  • Size

    890KB

  • Sample

    200717-4dy3f4spwj

  • MD5

    43a4ff5752ddee3df016f2eb38ed8874

  • SHA1

    1d12ed5721f87d69c0f6f3e102d59b48605e8a7c

  • SHA256

    53aea080cd433c61d90184c531d36de3d0f82649579997dce665f8f3f80039dc

  • SHA512

    05f410f08d049ad24a7165074d6fc9aa0d479ad2d5e04cda6569d761f21ae81ef30ca24b2eb4aca9afeb1ed76fabafc6c464103c5587102c58c53fc5e87e3962

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.ru
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    08140480968Ju@

Targets

    • Target

      544755300977.exe

    • Size

      890KB

    • MD5

      43a4ff5752ddee3df016f2eb38ed8874

    • SHA1

      1d12ed5721f87d69c0f6f3e102d59b48605e8a7c

    • SHA256

      53aea080cd433c61d90184c531d36de3d0f82649579997dce665f8f3f80039dc

    • SHA512

      05f410f08d049ad24a7165074d6fc9aa0d479ad2d5e04cda6569d761f21ae81ef30ca24b2eb4aca9afeb1ed76fabafc6c464103c5587102c58c53fc5e87e3962

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Drops file in Drivers directory

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks