General

  • Target

    785963.PDF.7z

  • Size

    409KB

  • Sample

    211019-hrjt2sgccm

  • MD5

    6e6e0fb9c4dd39db960331296a527057

  • SHA1

    19ad12250aaaa3a632d63d0d8cfbe6b1768b3d20

  • SHA256

    b0f93f9a0efc16bc1c7bad8b4f04ad5e7a58d4d9091cc74e71917d88830fa1ab

  • SHA512

    3831f6cc64a026c3e7294ce24fff9ec217e724de0b7770c68afb08e53801f315f72ad0afc4b5fa65eb7a6ba50680052d004c804ab665f84331561d598ebc3841

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.merchantexint.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    merW&13@

Targets

    • Target

      785963.exe

    • Size

      785KB

    • MD5

      5ca59947026aa9ae631704ce604eaa5f

    • SHA1

      f7743be57e66c79397a2d607a0a20383835a9e1a

    • SHA256

      d60a45b44a0800df38057447057dbb5e6107e21b8000d98fb1cdb0acef3ccffa

    • SHA512

      4e5cfcb4c78028af08a107eb6d9b33b7f2f3f16c2c60b40bcc552cced956960dfda546611f8c703d10aa4dc09f4f6b1460551b68c1294a9ed8974345719d4ac6

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks