General

  • Target

    5df9b35d247c17869ee416fa9f9d4688fd7aad246ed9ee17fe7612d99258d44d

  • Size

    320KB

  • Sample

    220520-2gzbjafch3

  • MD5

    2412f02a1638470e87e04ecae238be78

  • SHA1

    4a6b797f99fd7dffb204588b80b5a45b9df54b9d

  • SHA256

    5df9b35d247c17869ee416fa9f9d4688fd7aad246ed9ee17fe7612d99258d44d

  • SHA512

    46c00c112dc81b11e207e33c5e6cf34c60121cef23bf8f0a816f50f70c181bce41e576ff7b375773ee7e4c513e6d97069f45b70f8871e93f12130fa5486843e4

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    atk9202

Targets

    • Target

      NEW ORDER INQUIRY.exe

    • Size

      337KB

    • MD5

      d8e2e042791b6f4c7ae28624d7a1de92

    • SHA1

      5373277d7bc120b129897505b566e7e2d31543d1

    • SHA256

      50bb1f29f0f8ed951bfa9f9d6dc45611765f20f683cdc2270c5a2c8b7dff1d3f

    • SHA512

      2a44d414a10391919a68113657aa50eca22a1d0497f9ff1d8a48e078f70cbefec811e31eadbb1f57b2d893c72ac9e34d4b1a41dbd5698e0a17d7a5c5a8002f74

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks