General

  • Target

    INVOICE E-4137 REV.1 AND E-4136.exe

  • Size

    534KB

  • Sample

    211019-j4e73afde4

  • MD5

    cda024dda8157003d8b0d712b35e5e34

  • SHA1

    aeceba6b820ffe7cfab69d210564820a5908e5cb

  • SHA256

    4e3fcc5ee2cb32c94894e959ef579436dd2c564cdc83970966109d3c2710b045

  • SHA512

    7ed7dae5f3452ae62fdc53bf7131f7e117cd24abad94ae3246a3d772e4dc82b4094de2fcdf21ffb9b4133f2f47a01015d565f74134c0d0056dbfef3a1063569c

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.bulletproofprotections.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Everest10account

Targets

    • Target

      INVOICE E-4137 REV.1 AND E-4136.exe

    • Size

      534KB

    • MD5

      cda024dda8157003d8b0d712b35e5e34

    • SHA1

      aeceba6b820ffe7cfab69d210564820a5908e5cb

    • SHA256

      4e3fcc5ee2cb32c94894e959ef579436dd2c564cdc83970966109d3c2710b045

    • SHA512

      7ed7dae5f3452ae62fdc53bf7131f7e117cd24abad94ae3246a3d772e4dc82b4094de2fcdf21ffb9b4133f2f47a01015d565f74134c0d0056dbfef3a1063569c

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Drops file in Drivers directory

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks