General

  • Target

    2662f9a6102d41aa03023c29936ab6ae2ed32407189161dbf0108ea5eeb2b595

  • Size

    529KB

  • Sample

    220520-2lzsvsfeg4

  • MD5

    e2bc33a92f4072e2566e305ce9fe5fe5

  • SHA1

    d65a69ae26f49949e8d6f82b1a3e7911b668a09b

  • SHA256

    2662f9a6102d41aa03023c29936ab6ae2ed32407189161dbf0108ea5eeb2b595

  • SHA512

    f41477dc5a35ebc08ba7e74c51f37ca205c540627c1bb403005b6aeed5d773e601bd50d0b9b7a9a6d1afa5835aeb2e9ca4f7dc4ff1336891d034181851c4d061

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.threewaystoharems.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    sales@123456

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.threewaystoharems.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    sales@123456

Targets

    • Target

      RFQ.exe

    • Size

      624KB

    • MD5

      65cfa3667c17e9b7bd5fe7d2339f3e6b

    • SHA1

      5651deaac93aad78d64cd511690e12b64dc55ecc

    • SHA256

      808ae173992efd7abc9a690e121f2a392fc20c77aec62dd3808ff1068f664d98

    • SHA512

      10b9c0276f1c3a29dbff5e9bc1b01a4032059ba3970f186d83a559072fb162c627b19480104895d199c520ce83c9cab382ab7de9987b6f1779e720f6f20abc4a

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks