General

  • Target

    QUOTATION.exe

  • Size

    673KB

  • Sample

    211025-twydsagdc6

  • MD5

    05ab7c5ea99f0b21748ad1d82374d1a2

  • SHA1

    5e58ace479d278c43df05f3d65a61caa9135b842

  • SHA256

    63cf2188cbcc6e884c07331afb30c937cc678bc4552cee83b3a689a927a84c5d

  • SHA512

    60c124a9e79316145eb67667ccd1ceb88db00dd71a023e30c917bcf453f7d8311150d8815a17d8f4579c33dce69da6048ac0c650e433d1a122b0fab8f91230d3

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.aldhiyafainteriors.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    dhiyafa@987

Targets

    • Target

      QUOTATION.exe

    • Size

      673KB

    • MD5

      05ab7c5ea99f0b21748ad1d82374d1a2

    • SHA1

      5e58ace479d278c43df05f3d65a61caa9135b842

    • SHA256

      63cf2188cbcc6e884c07331afb30c937cc678bc4552cee83b3a689a927a84c5d

    • SHA512

      60c124a9e79316145eb67667ccd1ceb88db00dd71a023e30c917bcf453f7d8311150d8815a17d8f4579c33dce69da6048ac0c650e433d1a122b0fab8f91230d3

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Drops file in Drivers directory

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks