General

  • Target

    PAYMENT FOR OVERDUE INVOICE13.exe

  • Size

    361KB

  • Sample

    211026-f8allagha8

  • MD5

    46ec049e8eb3b4cbdcef2517f4d423bd

  • SHA1

    1761154ad2d8107192d33867180d5197b7066ca6

  • SHA256

    c86eba646c3fa849804b19df499e180d6ae21e92d9935d7e7886f6e8a1d051a2

  • SHA512

    5e4eeb875ab771afd5bb808458c82a8d11694c4f28ab9b812b719658e3235131f21052216ea3f4c6fa7ffd4be68fb8946cbb23378d4d1a704cada0864d1f34d8

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.privateemail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    mmm777

Targets

    • Target

      PAYMENT FOR OVERDUE INVOICE13.exe

    • Size

      361KB

    • MD5

      46ec049e8eb3b4cbdcef2517f4d423bd

    • SHA1

      1761154ad2d8107192d33867180d5197b7066ca6

    • SHA256

      c86eba646c3fa849804b19df499e180d6ae21e92d9935d7e7886f6e8a1d051a2

    • SHA512

      5e4eeb875ab771afd5bb808458c82a8d11694c4f28ab9b812b719658e3235131f21052216ea3f4c6fa7ffd4be68fb8946cbb23378d4d1a704cada0864d1f34d8

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks