General

  • Target

    PO #673975. PO #192075.exe

  • Size

    1.8MB

  • Sample

    210126-8ln68m9422

  • MD5

    2872c85bb890812c9619fcc931ce05a2

  • SHA1

    e96d950ac073aeee49b241eae694b76940e8cf95

  • SHA256

    46096a5640a91cddbb2ea4d49d24f6df8e2d079f68a2559849ee9ff3a50281c3

  • SHA512

    8346292a7cc7720a0472fc14c709703bd06e7ff2c523cc85dfa607f27e3f0b175a4f3ee030f7b1612a5188fb2912308d7690d2ed5e4108f8ab445c5695ab2558

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.newviking.com.my
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    {&SgX:^(7m

Targets

    • Target

      PO #673975. PO #192075.exe

    • Size

      1.8MB

    • MD5

      2872c85bb890812c9619fcc931ce05a2

    • SHA1

      e96d950ac073aeee49b241eae694b76940e8cf95

    • SHA256

      46096a5640a91cddbb2ea4d49d24f6df8e2d079f68a2559849ee9ff3a50281c3

    • SHA512

      8346292a7cc7720a0472fc14c709703bd06e7ff2c523cc85dfa607f27e3f0b175a4f3ee030f7b1612a5188fb2912308d7690d2ed5e4108f8ab445c5695ab2558

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks