General

  • Target

    payment details.pdf.rar

  • Size

    87KB

  • Sample

    210227-pnqnyxgbyn

  • MD5

    9db67123d16bf7c82c6001fd376f3aea

  • SHA1

    f8b506939b8e0b2d46b140bbed63196b517e365f

  • SHA256

    b1ca17a4e37f32c6785c2c08ddbbf96e4d287eecfbe32eb544c82e2a5dbd4312

  • SHA512

    f90a3fcc2b7c76878a6a158dadaa0c17fbe92014685e9d057b2a8187c5789002e94380b348d5447feed350116b70d58fea6bdb90370bf654a2bd7f401842273a

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.etc-ks.com
  • Port:
    587
  • Username:
    etc.express1@etc-ks.com
  • Password:
    bEK2FBG#ds|K

Targets

    • Target

      payment details.pdf.exe

    • Size

      216KB

    • MD5

      ce249eac42648acbd1fdb4dcac4b93b2

    • SHA1

      ece85af062c4dba9a4b56b53b6f926fd974d7f90

    • SHA256

      367bd3bbd27bcfb4020ea2e8e19bcef7e7613677514df74990980bb5cbd2faa4

    • SHA512

      c16f1640fb08378054753c7d0ce520fbc8a7445d54bd9736c5594d0fa6127c7ca714974449e7b90e77db2afa6ce6392acd0507b80de75e8304e23c1c524b2d7e

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Drops file in Drivers directory

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Tasks