General

  • Target

    94bf4fcd5ae08ca59d02312f2f10b4501294a64baa78dbdca346590d54773ff4

  • Size

    370KB

  • Sample

    220520-2czrhafbb2

  • MD5

    c4c024a17b1e01a7b13934ab1a5a4850

  • SHA1

    e1c34ddb79e38ce0fd1ded238a086c5b1271ba90

  • SHA256

    94bf4fcd5ae08ca59d02312f2f10b4501294a64baa78dbdca346590d54773ff4

  • SHA512

    69f88109d07a33f92423ffe84ce82f65467239b8f13577d56d9dec8f0e7ce793c38e2e7af0548c6c8ce6d76aef9f6e060df0b6700ff80288daefd96c3d30e9d7

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    mosque10

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    mosque10

Targets

    • Target

      URGENT_QUOTATION_PR #270473.xlxs.exe

    • Size

      458KB

    • MD5

      86fc98a0a100edc402bacbb5cdae261a

    • SHA1

      c6ce415988f9066f5c9d7c75443ba05a90b4595d

    • SHA256

      53c2646413f8ad24c8faf0230527a207a163df8df788b45f36afe2d55210eb2d

    • SHA512

      e5acaaae2bd179b55ec16ce05963a759376776cd4ee9157af02ad570e72cd3d3dba7b4dbffd875d1f48f25c3429b7bd67be4ba938fbfa46619a5e20521a338a1

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks