General

  • Target

    94e40e838fec7771d393daacf71cc69b9a09b0291069cc40e8d28df8f6c9edab

  • Size

    409KB

  • Sample

    220520-2cx8nsfba8

  • MD5

    54b3fc90f82fbbcefcf528e9a8c4c660

  • SHA1

    f774945df2c0380432d6f379394abfbb3ede49c9

  • SHA256

    94e40e838fec7771d393daacf71cc69b9a09b0291069cc40e8d28df8f6c9edab

  • SHA512

    32c1d42e647c9d2b0b1fb0ce0441d4fef39029a328bccbfe3b0c73e95603c8b487eb4e0944e7739cb0ef0285e7d980cbfa818f8f14eeafd8a0158de92ab1bc56

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.leffamatrizes.com.br
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    amx1020

Targets

    • Target

      Statement July 2020.exe

    • Size

      476KB

    • MD5

      e309883e50a4d2bb148238efa4cb455b

    • SHA1

      f30d7904f67d3483368506ae05fe91d215c6af06

    • SHA256

      c5df3c7e944f4f367f05546bcf2a661db13dae555a585f16b7599d35cb12213e

    • SHA512

      b26ece277c15a3a9874fd34a95276e370604d4f3083646418dcd6aaedd51570e2051fd16c568b7c59ac3e617fb096c67fb423c66d14d27f0fc9035dffd06c728

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks