General

  • Target

    items.doc

  • Size

    383KB

  • Sample

    210504-sfa8zwep4x

  • MD5

    9761ac3d2ce33b764ed037486bb84998

  • SHA1

    b0daa6953e3c6c88f1fd436b90675bc0b69259ab

  • SHA256

    3b09b12a8088522bd05d01721976858896151a31638f1b70d3bd6159e6fb6cf1

  • SHA512

    75e349e681d695773751a6e60f08bbd279772e01b292731e26912de0002db56844a1ba72cfe76f4f70d090895d0db0f310f0a4436cf726d95707c0ca67a055fe

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    asus-tv.tk
  • Port:
    587
  • Username:
    arinzelog@asus-tv.tk
  • Password:
    7213575aceACE@#$

Targets

    • Target

      items.doc

    • Size

      383KB

    • MD5

      9761ac3d2ce33b764ed037486bb84998

    • SHA1

      b0daa6953e3c6c88f1fd436b90675bc0b69259ab

    • SHA256

      3b09b12a8088522bd05d01721976858896151a31638f1b70d3bd6159e6fb6cf1

    • SHA512

      75e349e681d695773751a6e60f08bbd279772e01b292731e26912de0002db56844a1ba72cfe76f4f70d090895d0db0f310f0a4436cf726d95707c0ca67a055fe

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • UAC bypass

    • Windows security bypass

    • AgentTesla Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

3
T1089

Modify Registry

5
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

System Information Discovery

4
T1082

Query Registry

2
T1012

Collection

Data from Local System

3
T1005

Tasks