General

  • Target

    752a729c44f85d84b1ccef7fa55b545b4c18ea516ad276dc3cbedd2e12179b2b

  • Size

    671KB

  • Sample

    220520-19pgcsaaeq

  • MD5

    1f7ee4e548cc959a2af30e8c69fa64fc

  • SHA1

    faee84d36b854e3474c90be3522d639ec515d8e4

  • SHA256

    752a729c44f85d84b1ccef7fa55b545b4c18ea516ad276dc3cbedd2e12179b2b

  • SHA512

    d0c037ee91675df28b31bafd520abd25a48cd11408a793142310136316b2898742fa8fcef9f5b483b623f939ebded5a440b7f3024fd9ea7d8a30e0a253b5ca66

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Loverboy123

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Loverboy123

Targets

    • Target

      752a729c44f85d84b1ccef7fa55b545b4c18ea516ad276dc3cbedd2e12179b2b

    • Size

      671KB

    • MD5

      1f7ee4e548cc959a2af30e8c69fa64fc

    • SHA1

      faee84d36b854e3474c90be3522d639ec515d8e4

    • SHA256

      752a729c44f85d84b1ccef7fa55b545b4c18ea516ad276dc3cbedd2e12179b2b

    • SHA512

      d0c037ee91675df28b31bafd520abd25a48cd11408a793142310136316b2898742fa8fcef9f5b483b623f939ebded5a440b7f3024fd9ea7d8a30e0a253b5ca66

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks