General

  • Target

    f0d2d9da576153363d789d0751124594a9edf52ea54f0078ff71ce0b827cba44

  • Size

    1.4MB

  • Sample

    220520-154eqaefg2

  • MD5

    df306dc724272277ca50ad5d7bd81540

  • SHA1

    c88fd9d533fadfcce37829cabfa70a40a6b687ec

  • SHA256

    f0d2d9da576153363d789d0751124594a9edf52ea54f0078ff71ce0b827cba44

  • SHA512

    394e0c7e803173f4666b9c8c50f1306858136be7ffd92f630369b7eb47c1bbcbcea002f8b83b1146a89b279481cfeac47ebbb931832b656759bba9958d037fef

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.strongpetrochem-com.me
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    yUyud*b3

Targets

    • Target

      ADNOC_RF.EXE

    • Size

      863KB

    • MD5

      1a1c7ecdc0709500ecafc8ae4d19fb40

    • SHA1

      4c81c3090c1e88a448abc65e72f33498209337c5

    • SHA256

      f6d6d792db19cd7c5e9bc9178a59c5cbfdc15890b1c1dfaa5087a02d344ada13

    • SHA512

      8a1ddea7fb3313f778d9be223d2ba361d93cbf174ed522024f9b8ffa3f91a29450fa18bee47ba11d3b9e92c1d5f992fa68e15e6d575c5eaff688f58343b2c971

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks