General

  • Target

    de827d9f82d681f045c51f99b21f772ec0a3af4979b562704cfcf9095987f130

  • Size

    518KB

  • Sample

    220520-17qlmshhgq

  • MD5

    be5b52a0d8273186b63ac79b521e9006

  • SHA1

    16da9c4ea3dca59603049ea99a7de76eafbbeb79

  • SHA256

    de827d9f82d681f045c51f99b21f772ec0a3af4979b562704cfcf9095987f130

  • SHA512

    cd2c3565b56481647ee5946586b5aa9ed4e92e963567803aeda46eb671a5919c596f34da5668e3214cfd6d5c535fa9088a38ab7c2dc059e3f148595ee3bf3a1e

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.ciftci.com.tr/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Wefullground2#

  • Protocol:
    ftp
  • Host:
    ftp://ftp.ciftci.com.tr/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Wefullground2#

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.ciftci.com.tr
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Wefullground2#

Targets

    • Target

      PMT.exe

    • Size

      641KB

    • MD5

      7bf2c1a3e369148e2e59280a91c23abd

    • SHA1

      769b19e5208760910a25e59508f6b4258ce0f7ee

    • SHA256

      0e7d9a0423e2abe849c313d741de58cb172512f0b81ca56680a0c98bcc5a28e8

    • SHA512

      e616f4599ec00843a7a28557a7af5aea18ed0ce4eaf97596aa3a25b3380817d2c4c5a62817bfd29d16d7d19aab177bdbba71b00242eb2836100512b1082004dc

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks