General

  • Target

    Statement Of Account.exe

  • Size

    160KB

  • Sample

    201126-743cr79qbe

  • MD5

    e6f5720c61791304ad99987695c07d81

  • SHA1

    910c9f05f590203d9662140ebd2ee323ff937367

  • SHA256

    2d2996c0344c2ed157f9affb6468c803dc196b519574c945c8fe40e445418030

  • SHA512

    9809d2b13d982600782428a6efa516ab530054d81ddc5055f7365353f2530e588b1d19cee12021cbc52ddd4521865aeb194d682c630f3a9abd448af9c53320e9

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.ru
  • Port:
    587
  • Username:
    new.surelogs@yandex.com
  • Password:
    lololo12345

Targets

    • Target

      Statement Of Account.exe

    • Size

      160KB

    • MD5

      e6f5720c61791304ad99987695c07d81

    • SHA1

      910c9f05f590203d9662140ebd2ee323ff937367

    • SHA256

      2d2996c0344c2ed157f9affb6468c803dc196b519574c945c8fe40e445418030

    • SHA512

      9809d2b13d982600782428a6efa516ab530054d81ddc5055f7365353f2530e588b1d19cee12021cbc52ddd4521865aeb194d682c630f3a9abd448af9c53320e9

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Modifies WinLogon for persistence

    • Modifies Windows Defender Real-time Protection settings

    • Turns off Windows Defender SpyNet reporting

    • Windows security bypass

    • AgentTesla Payload

    • Drops startup file

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

6
T1112

Disabling Security Tools

4
T1089

Credential Access

Credentials in Files

3
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Command and Control

Web Service

1
T1102

Tasks