General

  • Target

    INVOICE.exe

  • Size

    479KB

  • Sample

    210119-c5jh9f7l76

  • MD5

    bedc66c12a9045e1d8e89fd47ccd4ebb

  • SHA1

    43be31d907ec599edcd6c64b61a5d464c02a981b

  • SHA256

    94e4d23e3ede10365bdc9ebcf52fab0428c693b3c8d768d4090139d9607d3f95

  • SHA512

    c807e423c21ea4c7d507f3d8f7023acc1863490c6f984762fd146bf64ce2ba92f5df143d4762b91eace2f807029be023bbdd29553e2aa49eafaa4193f8e1e6b6

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp-mail.outlook.com
  • Port:
    587
  • Username:
    angeldominic2016@outlook.com
  • Password:
    pastor12

Targets

    • Target

      INVOICE.exe

    • Size

      479KB

    • MD5

      bedc66c12a9045e1d8e89fd47ccd4ebb

    • SHA1

      43be31d907ec599edcd6c64b61a5d464c02a981b

    • SHA256

      94e4d23e3ede10365bdc9ebcf52fab0428c693b3c8d768d4090139d9607d3f95

    • SHA512

      c807e423c21ea4c7d507f3d8f7023acc1863490c6f984762fd146bf64ce2ba92f5df143d4762b91eace2f807029be023bbdd29553e2aa49eafaa4193f8e1e6b6

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Tasks