General

  • Target

    NEW order.rar

  • Size

    520KB

  • Sample

    210416-2jp77n3jjj

  • MD5

    2cf38e082424bdde914e6c306e966cb8

  • SHA1

    45f8f8ba298b218ca3d189d2f368cbc162d44bfa

  • SHA256

    70ddb3ba767338a506e8753c7a1f51ad0bb9b452a2e62b434154cb9540d70dec

  • SHA512

    f0cb88d4ff284434158c86f8eaf522713fcf719075c9a1c63dc59e3277ebf2aad173f98084b5edc3691e3f56d9ce4b41b58a832bbfb41b10d60f9d13088a1605

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.ckclegal.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    S1_CJLP=XwM+

Targets

    • Target

      NEW order.exe

    • Size

      798KB

    • MD5

      622f89217d5c630c8493f356a3ed5e23

    • SHA1

      c8275a16747ae7c550f1b14e71c91dc06eb1ceef

    • SHA256

      f1be45f58c89c8b3b77fda6341568c4388d95ded7597304a04b98c57ddfc4a6c

    • SHA512

      e0ecf783296afac12ce6ac7567721f5ae9542047f145fd4f40703840781cf34e5b19229f3df9ffc07981e4b085881ca4a41d3c7076abdc31180fdaf5588d335e

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Drops file in Drivers directory

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks