General

  • Target

    805d72f539f9893f81fd79199866f0dddcca2d8141664115fe6ce3ab40438fa0

  • Size

    390KB

  • Sample

    220520-2d99mafbf6

  • MD5

    fda08ea79b0e6a6603aafc20df600ea9

  • SHA1

    99391cd1b6a3a33073b867ba7f088deeb18613d5

  • SHA256

    805d72f539f9893f81fd79199866f0dddcca2d8141664115fe6ce3ab40438fa0

  • SHA512

    0d24c1487819b82c0657465fb11e6ee558f4375b00a6560a4a0110f34112d31b6db9bc3d2c87178f534ceb724745a1db5c9ca99c2d6faecc9eff845fd8837c77

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    rosemary0101

Targets

    • Target

      RFQ- 6852841-August.exe

    • Size

      478KB

    • MD5

      6795b074f9f0fb9304775dd496845108

    • SHA1

      62d9a80a3a9d567b4047fb48579c0c64e5e849bb

    • SHA256

      10278b0bf04f79014abdbfd1d5bbe2eb2c9583b7f2a30e589539e2740bb19d7d

    • SHA512

      90dde7022c60e9f19d439045521c5e34ae776ce2e36a078251b0cad7df462a9be57ff5e830bc6d3a3bafc9cd5c72fc135bdcf17131987b8637b7e1357a9f2e70

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks