General

  • Target

    SecuriteInfo.com.Variant.Cerbu.117505.10723.10196

  • Size

    790KB

  • Sample

    211018-1chybaehf6

  • MD5

    9fd8919e62792e6d93995b5f7abda850

  • SHA1

    c143d0ece3715bc4c484e201f4b9c5e7630e7fd2

  • SHA256

    20e9c3ad420ffd76094590adced58f056d38e5d6afe3ee9e21e7b29ff5a80da7

  • SHA512

    35bcd80094c49e5ef9399a52277b4a592cd4bd659a50ebabfbf62775d5681f1028eb29a357f4e19ab93a528f14e0632eebc8a6f2ccf9234bc2f7d76a80dd963e

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.xxltrucck.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    vFguU*i0

Targets

    • Target

      SecuriteInfo.com.Variant.Cerbu.117505.10723.10196

    • Size

      790KB

    • MD5

      9fd8919e62792e6d93995b5f7abda850

    • SHA1

      c143d0ece3715bc4c484e201f4b9c5e7630e7fd2

    • SHA256

      20e9c3ad420ffd76094590adced58f056d38e5d6afe3ee9e21e7b29ff5a80da7

    • SHA512

      35bcd80094c49e5ef9399a52277b4a592cd4bd659a50ebabfbf62775d5681f1028eb29a357f4e19ab93a528f14e0632eebc8a6f2ccf9234bc2f7d76a80dd963e

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks