General

  • Target

    Halkbank_Ekstre_20211020_101606_507653.exe

  • Size

    48KB

  • Sample

    211021-spk97sbdap

  • MD5

    1b21040231567a32423b79ea6e4765ca

  • SHA1

    b2b30b5a57e6f8f1f36a385b691bd1f0e4bd57b3

  • SHA256

    36b46699b20b4ce357b902c256b8bd938898c79fd0894741173dc67843ec1700

  • SHA512

    2449041403ee540c4fb8007fdfbc40ab742f5698be391ad75a1f7aa3ae6756676457e8b1d0f582e25c6afa33b8449f65c2aab5069bcbd10f4907b8355ae4d27e

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.vivaldi.net
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Davidchukwuka2016

Targets

    • Target

      Halkbank_Ekstre_20211020_101606_507653.exe

    • Size

      48KB

    • MD5

      1b21040231567a32423b79ea6e4765ca

    • SHA1

      b2b30b5a57e6f8f1f36a385b691bd1f0e4bd57b3

    • SHA256

      36b46699b20b4ce357b902c256b8bd938898c79fd0894741173dc67843ec1700

    • SHA512

      2449041403ee540c4fb8007fdfbc40ab742f5698be391ad75a1f7aa3ae6756676457e8b1d0f582e25c6afa33b8449f65c2aab5069bcbd10f4907b8355ae4d27e

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Modifies Windows Defender Real-time Protection settings

    • Turns off Windows Defender SpyNet reporting

    • Windows security bypass

    • AgentTesla Payload

    • Nirsoft

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks