General

  • Target

    614548546d14df033e549438f2c09bb384e5c1dedd39b37d9349e1c162eb5709

  • Size

    519KB

  • Sample

    220520-2gpgbsadek

  • MD5

    724c41ef103d584bfa5637a5e0e7f7df

  • SHA1

    6853ccca29b8ff01508eea831fd2599d6496ace8

  • SHA256

    614548546d14df033e549438f2c09bb384e5c1dedd39b37d9349e1c162eb5709

  • SHA512

    e56bf0b73cae106293a7513196565c92b98e435382edac4e355dc3b110eb0439c806302d04c4c78ec9348b3ceaf6fb9aad8fdacf0b7b46e689dd5894a08b63d8

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    qwerty123@

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    qwerty123@

Targets

    • Target

      HBL-BL-copies.new.XML.eml.exe

    • Size

      572KB

    • MD5

      68b47901c3484d260de8dd21ac24d230

    • SHA1

      1e731dbc15ab59d173451aa770f263aa2b287e8a

    • SHA256

      236c4c9b2fca74b99831acd489771a516612a233176dd3093b70ea146ec6717f

    • SHA512

      e302ba856ce4f9a571fa5002d11203a5f9e46f4fd46a080716007d9a3efcdcd454e197b6981dbb7d3f6d2d8f529cbf07e8c2d80e56ce82b3d4d66931f3bcdd6a

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks