General

  • Target

    0b6652d43ca552e9e851fed9327cf429286cd9b58464c66d316591d38013e068

  • Size

    512KB

  • Sample

    220520-2pacdaffh5

  • MD5

    dd8304a4167a6a75d93f107d6c403d7f

  • SHA1

    d4d10e57773fe37d5aeb970a79587f90cf60e198

  • SHA256

    0b6652d43ca552e9e851fed9327cf429286cd9b58464c66d316591d38013e068

  • SHA512

    835cc5900de56f3938a66644c81d8d052b108ae35ec1d055ad86d4720ed5f77496528ca8dcb0477d5d583bae8347ad97f225635daba6429abdd8697617474945

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.construccionesyaceros.com/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Um^[x+1a{piP

  • Protocol:
    ftp
  • Host:
    ftp://ftp.construccionesyaceros.com/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Um^[x+1a{piP

Targets

    • Target

      NEW ORDER#584532-pdf.exe

    • Size

      546KB

    • MD5

      307902f464ab56b98f667520dcd68295

    • SHA1

      ebce226d5a550788a6ea39984a9521aff0892caf

    • SHA256

      abce854dbb1be834088423c8a911d7111cd6d205b9f6b44be000652860fa03c6

    • SHA512

      05bbe1ecd6e4a04908e840ef47290784fba812f69c9bfeb0a674a5ec54eff3702213445c6734bd8474ad88ea06b6aea89ea09344e80cacf5911c4e1642ab11a0

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks