General

  • Target

    QUOTATION 22072021.exe

  • Size

    742KB

  • Sample

    210722-5mf432qz9a

  • MD5

    506887f557d9399e9cd663b65b2271d5

  • SHA1

    4ff9f4cc2408073bf91b87a92ba6f6d74efcead0

  • SHA256

    1ba742a8035002362e46828bcb7a24342bed430d6bcd59999afd520dba3de81e

  • SHA512

    bb87d67afb0b9263f2802a5ca3d8b36c6e5a0005d7f5fec632e189db4f4337408d9b8994ed9ac2482efe379ef07ee0cf0ffbbadf4f17aba3ff951a09f8d67204

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.totalkitchensandbathrooms.com.au
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Zs^I;kEMItH)

Targets

    • Target

      QUOTATION 22072021.exe

    • Size

      742KB

    • MD5

      506887f557d9399e9cd663b65b2271d5

    • SHA1

      4ff9f4cc2408073bf91b87a92ba6f6d74efcead0

    • SHA256

      1ba742a8035002362e46828bcb7a24342bed430d6bcd59999afd520dba3de81e

    • SHA512

      bb87d67afb0b9263f2802a5ca3d8b36c6e5a0005d7f5fec632e189db4f4337408d9b8994ed9ac2482efe379ef07ee0cf0ffbbadf4f17aba3ff951a09f8d67204

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks