General

  • Target

    Quotation.exe

  • Size

    755KB

  • Sample

    210408-6ljjqpw75e

  • MD5

    1e72fdc63d96b7f7681cb76d2eb34d36

  • SHA1

    66e0afcc111a42a15817ccb6fce14f885b354c95

  • SHA256

    1fa8f6d52e8299dc1a67d9b3ba8af0d876e12cae58f72276ebecd1711c9a97e7

  • SHA512

    00e1667bb4cd7d4228f4788779ee37677bdcf311dd4b802a63e08a2626a66b297d8ae8d20c1cf8c8f4f973feb516b24dc00cd1873a4c8ce693b18fa3671f77e5

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.vivaldi.net
  • Port:
    587
  • Username:
    Ricardo2021@vivaldi.net
  • Password:
    Qwerty2020Hp##

Targets

    • Target

      Quotation.exe

    • Size

      755KB

    • MD5

      1e72fdc63d96b7f7681cb76d2eb34d36

    • SHA1

      66e0afcc111a42a15817ccb6fce14f885b354c95

    • SHA256

      1fa8f6d52e8299dc1a67d9b3ba8af0d876e12cae58f72276ebecd1711c9a97e7

    • SHA512

      00e1667bb4cd7d4228f4788779ee37677bdcf311dd4b802a63e08a2626a66b297d8ae8d20c1cf8c8f4f973feb516b24dc00cd1873a4c8ce693b18fa3671f77e5

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

3
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks