General

  • Target

    Cotización-21102021.pdf.exe

  • Size

    540KB

  • Sample

    211021-rdvh3abcdr

  • MD5

    7ca3c2ad1da3bd5514be7054b2af0a78

  • SHA1

    bc96a6c3f9f442f2d52a8ec7e48a7d010b6d767b

  • SHA256

    5bad96dda4ae65a4b81d53e3ddd51eaa0181e07c5dea64b1d1bfb561b900dc53

  • SHA512

    c4b71df1e2e40c6f9a5489f7b2f5f9935053b524d99a24f0c3869d0a9013a2441ac3b6c6f8f991b8df89fadba9890f946a4e7b5e3fbbd6f476d7fb9f8b2658c6

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.privateemail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    CHINADUA@#asx122

Targets

    • Target

      Cotización-21102021.pdf.exe

    • Size

      540KB

    • MD5

      7ca3c2ad1da3bd5514be7054b2af0a78

    • SHA1

      bc96a6c3f9f442f2d52a8ec7e48a7d010b6d767b

    • SHA256

      5bad96dda4ae65a4b81d53e3ddd51eaa0181e07c5dea64b1d1bfb561b900dc53

    • SHA512

      c4b71df1e2e40c6f9a5489f7b2f5f9935053b524d99a24f0c3869d0a9013a2441ac3b6c6f8f991b8df89fadba9890f946a4e7b5e3fbbd6f476d7fb9f8b2658c6

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Drops file in Drivers directory

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks