General

  • Target

    SecuriteInfo.com.Trojan.Packed2.42809.17472.22679

  • Size

    815KB

  • Sample

    210121-7y9mzn9f92

  • MD5

    1965c283581daeb2fc16e26de73839aa

  • SHA1

    2497d8921572b8a7c78c4f081647b1b0aa931a52

  • SHA256

    09f886079111e9f43ece7c64d2636e55149899597911b91a6b27dd560594a1f1

  • SHA512

    54c3f7538f3b952e4ff363626afc7576f7055d6f85a4f4cd99e7ee0f68dbdae36bce14d673afb60334f9cdb9de83e786c26b13dcf141f7f2bed9f4ea34921351

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.ru
  • Port:
    587
  • Username:
    kenanibr@yandex.ru
  • Password:
    strama5150

Targets

    • Target

      SecuriteInfo.com.Trojan.Packed2.42809.17472.22679

    • Size

      815KB

    • MD5

      1965c283581daeb2fc16e26de73839aa

    • SHA1

      2497d8921572b8a7c78c4f081647b1b0aa931a52

    • SHA256

      09f886079111e9f43ece7c64d2636e55149899597911b91a6b27dd560594a1f1

    • SHA512

      54c3f7538f3b952e4ff363626afc7576f7055d6f85a4f4cd99e7ee0f68dbdae36bce14d673afb60334f9cdb9de83e786c26b13dcf141f7f2bed9f4ea34921351

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Tasks