General

  • Target

    e8787202c9ad9e69c0b3deaedc51542ee7aa7b3c55f642786d542197c996c6af

  • Size

    458KB

  • Sample

    220520-16vtzaegb9

  • MD5

    28a9640019bbcbaf1e62fa72cbf019bb

  • SHA1

    c9b92e09653bcbf4ec1c2f6eb85fcf5c743e1ca6

  • SHA256

    e8787202c9ad9e69c0b3deaedc51542ee7aa7b3c55f642786d542197c996c6af

  • SHA512

    38417f971439b63f1d7b7b2796643ee3f05417816a1acfbbb3e6101b0b4161b461ae6ff7bf412c74eed66d19df8faa99eb745cc787cbf5c962453334701d4902

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.blc.com.np
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Bhuramal123

Targets

    • Target

      BANK DETAILS,. (2).exe

    • Size

      545KB

    • MD5

      0812e6b42bce4af2abf9b12bbe8379a8

    • SHA1

      3f83730f63a233a6b37528b0fe8326d5ece24586

    • SHA256

      3333a191bc36b4a7a76e51c0b7b83c5d2b7d253f074789c2302ec598c30711b3

    • SHA512

      be52d77585fc3cb261b3b28b215f26daac4d2b8b4fbb6561a8a48ec207130619605c176d6dec11827826160f9c47655d12521433da5a0856291168981b0739f3

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks