General

  • Target

    CL00485Q1902589CLSCTB.exe

  • Size

    505KB

  • Sample

    201109-6xa835ql9j

  • MD5

    714917e5b4ddcfe8f1aed4a31944ee8b

  • SHA1

    32a82506a74300c541983b66ebc7179bb674374f

  • SHA256

    2393c64f19e5818eb506a2f8660be2a81ad6ec357baf132fa62ee30828d01fe9

  • SHA512

    bb607a11cd9b45325bda1c42776a6e205210eaa73939ad28bfa5cb0cbe8424a85fbb4660c45a68cf108d8e14938efc9d827247c319868b3abdc219cf32490c01

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    gabby.anthony@yandex.com
  • Password:
    43210001234

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    gabby.anthony@yandex.com
  • Password:
    43210001234

Targets

    • Target

      CL00485Q1902589CLSCTB.exe

    • Size

      505KB

    • MD5

      714917e5b4ddcfe8f1aed4a31944ee8b

    • SHA1

      32a82506a74300c541983b66ebc7179bb674374f

    • SHA256

      2393c64f19e5818eb506a2f8660be2a81ad6ec357baf132fa62ee30828d01fe9

    • SHA512

      bb607a11cd9b45325bda1c42776a6e205210eaa73939ad28bfa5cb0cbe8424a85fbb4660c45a68cf108d8e14938efc9d827247c319868b3abdc219cf32490c01

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • CoreEntity .NET Packer

      A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

    • AgentTesla Payload

    • rezer0

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Tasks