General

  • Target

    f282fc9b4cbbc123c37c9427fb00ad39e27c79c8fd185afc477e9699f1a46e56

  • Size

    499KB

  • Sample

    220520-15yt8seff6

  • MD5

    18cc707701ff01a352e354cf23d5716d

  • SHA1

    dd7aa08894da277cbc81be0513532af675f5fed6

  • SHA256

    f282fc9b4cbbc123c37c9427fb00ad39e27c79c8fd185afc477e9699f1a46e56

  • SHA512

    71ac80fffdb1a6e929a572eb084d219bebfac368c0441df040ce20ac356243835861ad3c31e3c7aa61fe004d8feff32a3eec2488f3bd9c023279e5f8494e1792

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Wm^kN*!7

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Wm^kN*!7

Targets

    • Target

      PO.exe

    • Size

      629KB

    • MD5

      80a403850f764cd5b6b6ca7815d1eef8

    • SHA1

      bd52782526e783fe7786e4cef0f169264c1b117d

    • SHA256

      1414f24264a3c0579250f74acdbb4ffffc79cf787221704b80cdab5829212bff

    • SHA512

      3d4eb72ccb52bea0c05f87885a1b054f294c1e40292aec9d7c09680c20ed4336e0645fefe4b586139642f16022e67cd9d7b62f4e69b00343e1b92cd30c8e9b69

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks