General

  • Target

    Payment copy.exe

  • Size

    407KB

  • Sample

    211019-mye7naffg2

  • MD5

    e2f86c16c7c72db83b10a29b143e6003

  • SHA1

    77e03fb7555078b7e4c69225f15e5ca42d876385

  • SHA256

    243f776b0d785b22e96738058e3cdfa0896c41948f80b8580414026e13617930

  • SHA512

    d7dddf2fd614c027a56b99b715eeda5060acc7789bf8d3648d93d6d95bba7aa17e2b998a8bedf67851d1ceda2417aae81ecbc14d059516bb57b80179d6195f49

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.privateemail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Everest10

Targets

    • Target

      Payment copy.exe

    • Size

      407KB

    • MD5

      e2f86c16c7c72db83b10a29b143e6003

    • SHA1

      77e03fb7555078b7e4c69225f15e5ca42d876385

    • SHA256

      243f776b0d785b22e96738058e3cdfa0896c41948f80b8580414026e13617930

    • SHA512

      d7dddf2fd614c027a56b99b715eeda5060acc7789bf8d3648d93d6d95bba7aa17e2b998a8bedf67851d1ceda2417aae81ecbc14d059516bb57b80179d6195f49

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks