General

  • Target

    confirm below invoice.rar

  • Size

    520KB

  • Sample

    210416-ed6z4zz5sn

  • MD5

    39325dc80666e2dc1124846ee05d4538

  • SHA1

    f9f4436183214043e75e39e86d2e8793f4459f6d

  • SHA256

    5710878413615a629139b9d577c3fe4a603038a1cc5ac73a9f98b1b5d6e88854

  • SHA512

    f2a750304c00504567f542c41412404d1ad7bb8e1d6f2b4b5f308a65a407fcf7ecb3ce1337f93a063d3354fd228ed2e95bc9a4a8eac7f2b3f0536910bf764df9

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.ckclegal.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    S1_CJLP=XwM+

Targets

    • Target

      confirm below invoice.exe

    • Size

      798KB

    • MD5

      622f89217d5c630c8493f356a3ed5e23

    • SHA1

      c8275a16747ae7c550f1b14e71c91dc06eb1ceef

    • SHA256

      f1be45f58c89c8b3b77fda6341568c4388d95ded7597304a04b98c57ddfc4a6c

    • SHA512

      e0ecf783296afac12ce6ac7567721f5ae9542047f145fd4f40703840781cf34e5b19229f3df9ffc07981e4b085881ca4a41d3c7076abdc31180fdaf5588d335e

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Drops file in Drivers directory

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks