General

  • Target

    c4e94808f3ff6682b898624c4e7a077dd974d0c9c541e5f4808ef130eb602578

  • Size

    371KB

  • Sample

    220520-19ebdsehe8

  • MD5

    b9c304f81accea0779413072ff186222

  • SHA1

    cc8525ac924e94950c2524adbf7a8fc27d046c79

  • SHA256

    c4e94808f3ff6682b898624c4e7a077dd974d0c9c541e5f4808ef130eb602578

  • SHA512

    c0e03276381a6f14264c28709ee84b59e7c8c4021bad7ef559c19d43df24b21775c9cf4c75b9d9fb566dc04c0e8e6ce83ff9224d17d5b6755b8b404447e0af43

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.privateemail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    gnaeask@2015

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.privateemail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    gnaeask@2015

Targets

    • Target

      PO#908827 dated 9-7-2020 2019BT206-1+2020BT021+042.exe

    • Size

      586KB

    • MD5

      771d6920c81e63c41104ceb4b31b3d95

    • SHA1

      556f0940be0985b4f661d57fa894de06d945a53e

    • SHA256

      2f749c6cbdf1d58629bc39b28bb2b1f74766bfb982cc31e3461d1c4bcbd32b01

    • SHA512

      2ba7095fef121ed4d31e5bc5a171f09baa4b3c274e56428ec1b2c4e32ecc4a83315f13268f0e569d045a6c2fc189315b5897b2f703ecbb21ce8093dc0c5b1938

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks