General

  • Target

    12a9296bbae006899ed14d94a52cdd92853798ae302b83ba57375642e53f2929

  • Size

    654KB

  • Sample

    220520-2njvesagak

  • MD5

    abb5e57d3065709c03973c9f31441a0a

  • SHA1

    9f27b017b8bdbb72a168fccc2d3b56d79998fce4

  • SHA256

    12a9296bbae006899ed14d94a52cdd92853798ae302b83ba57375642e53f2929

  • SHA512

    288839a6e1129deba28800b6a42a700b5f5f3401d1353854100eed250e10c7587c84df83dbef15d093bc2a45e1ad97c3718a4b2f40eeb9b075a9a0e8e8c8d566

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.grandtours.gr
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    !Bitter-bullet-chuck-major!

Targets

    • Target

      INVOICE.exe

    • Size

      594KB

    • MD5

      cdf5b175db3a7b60a0734daf15364717

    • SHA1

      c56332d8c17c6aa873dbf177c44472409628ae05

    • SHA256

      1df1597314ab01b00a84f5a025cb5112828d20fbc59dd3098fcb45fb88534661

    • SHA512

      0df64f13bf872ffcf5693076c05301fb8786b3c100232f76284594c8990556c189f864212a13075094216acdf6b6352c345d2495953a5fa528d151111a1edb01

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks