General

  • Target

    647e4a06ecaf7d9f5f992c7e52bb985bdc0e2000c2ccbdda5bb68ca78ede2e12

  • Size

    518KB

  • Sample

    220520-2gcsjaaddm

  • MD5

    e5859430e43ff8511f67620c401392bf

  • SHA1

    ffe90a04a859ce2950e2a4c1c7afb371ec49ffeb

  • SHA256

    647e4a06ecaf7d9f5f992c7e52bb985bdc0e2000c2ccbdda5bb68ca78ede2e12

  • SHA512

    792980acbcfd7d2ccbda7fe3cfb5a2d69b458e11a701ddfbebf957c9d5e8f47f3e89df8baa72125fbf4a10832de066e52f9b67c28b5cd33d161f86e10bbc3ec5

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    chi-node26.websitehostserver.net
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    @LENOVO,/+473

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    chi-node26.websitehostserver.net
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    @LENOVO,/+473

Targets

    • Target

      LIST0117398902791PDF.7z.exe

    • Size

      551KB

    • MD5

      68f96495af73a997500b00b2a88b599b

    • SHA1

      e4f722b3d8046e6404f933354d689448d326fd45

    • SHA256

      d4eec3387fde66fc5b45135db86b9fcdebcb75e199fe9be1a834d89cac6b9d13

    • SHA512

      cde2179228efcaaba6af7c48377ee15b445c617502a107ef0cb9287297437bd074e2b77698a7e08a3c44364d179390c4daadbdf4de05aab61368f1ca23475038

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks