General

  • Target

    shipping document.exe

  • Size

    903KB

  • Sample

    210419-bb15crt2t6

  • MD5

    b2e8cb36e8ed07eeb5873988a10e629e

  • SHA1

    4c27ed343a8991373edcab4856ee5455e060aa0d

  • SHA256

    1591047265c7c48f80cfaae3ce6745bd132236aad0cd93515f384fd94e583502

  • SHA512

    5c572770494269f70f00352c5d329fe757cd17f7cfebdc838675feec14ea2d7b2fe7d12fb5eb8a86836328666763ae4b4443a3c66b129c9e1da06ae84746328f

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.a-k.co.ir
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    09133434194

Targets

    • Target

      shipping document.exe

    • Size

      903KB

    • MD5

      b2e8cb36e8ed07eeb5873988a10e629e

    • SHA1

      4c27ed343a8991373edcab4856ee5455e060aa0d

    • SHA256

      1591047265c7c48f80cfaae3ce6745bd132236aad0cd93515f384fd94e583502

    • SHA512

      5c572770494269f70f00352c5d329fe757cd17f7cfebdc838675feec14ea2d7b2fe7d12fb5eb8a86836328666763ae4b4443a3c66b129c9e1da06ae84746328f

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Drops file in Drivers directory

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Tasks