General

  • Target

    198a2082d2a5bf1e7042ef3c5aa5c19f75a40f52d9cc9b36432bcf08dfc80cb4

  • Size

    544KB

  • Sample

    220520-2mzjgsffb8

  • MD5

    97acc99016459764ce8ec38e5d79844e

  • SHA1

    dbd88e0f97ad21b086ae78864f4a10b46856972b

  • SHA256

    198a2082d2a5bf1e7042ef3c5aa5c19f75a40f52d9cc9b36432bcf08dfc80cb4

  • SHA512

    b3088c061fab2f57756b9f9e6585dd8348a25a0f1aa1e92a51d9f99ff4206646b77ff38da9c911b19046bd361af62b971e5f0f132ce75ee494994b80516819ec

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.jaldhl.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    LlJGJr!5

Targets

    • Target

      ta9hOZ9yGYrrbrJ.exe

    • Size

      662KB

    • MD5

      f4262471f23208adc42ffbcaaf7cdb99

    • SHA1

      7e858fab80da0e74ce6eeb5924841cfb8cfa41cf

    • SHA256

      1ebe798364b176f491d9eb6b1b4eedf59e43d712883460f61212deafb2ddcf6c

    • SHA512

      1b55467a1f64d21fcb26ef768b2f7c59070d766ef41574b2d0ae4f88d4ddfbb0d821b26ff1fa8ef126c1f24f10b3351f1a7576af619f9211ba4f270577f599cc

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks