General

  • Target

    396982a79b9731d15ed130e4f2dbf01a14b243105bd58ad2edade78ee960042f

  • Size

    479KB

  • Sample

    220520-2klvlsaegj

  • MD5

    182f9ded93ba725b1d4d9a3d119880b3

  • SHA1

    91332329184fc5e38e90e27f48f43dfb5154345f

  • SHA256

    396982a79b9731d15ed130e4f2dbf01a14b243105bd58ad2edade78ee960042f

  • SHA512

    cbd8f1c784fa6219d3317c9eaa176f188bfd3138876eea334ebfb2f7934ab572eac9db7a100de0c1d60f813172528d17eb70aec2bf9d4bc1f18e9f0ab06f3551

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    mosque10

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    mosque10

Targets

    • Target

      URGENT_QUOTATION_PR #270473.xlxs.exe

    • Size

      512KB

    • MD5

      65020b545758df2c5a8b9397cc40d8e0

    • SHA1

      94ec19a6d4aa00951d57ff0a50100c6f3fe0791d

    • SHA256

      1eab0743a0c7a257a4e914404724f5ee37ed428aed24c341edc44f7878be9a52

    • SHA512

      a30fd8c66771455735449aa9cb4f67e9daebc704e0a57938bdd4017ab4b06ee7c4ad4d6f01bd97cf094624a2ca926a53f8a49d6f18eabba11e0b6a7fa5e5a271

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks