General

  • Target

    058a6edcb13766ae0387d7b3e270d54231553dceb2a55d3d16bb40ab5c39042c

  • Size

    372KB

  • Sample

    220520-2rsazaahdm

  • MD5

    6141a2ec78a4c3aa0b68813cbee7524e

  • SHA1

    86f1acb8bdb380d3ca62a07cf8270908ecc1704b

  • SHA256

    058a6edcb13766ae0387d7b3e270d54231553dceb2a55d3d16bb40ab5c39042c

  • SHA512

    53b1f96bcfadb6d20653641617c4e5da6d694592ef4b810d5502ecc6a9e8b51eaaf99dc3eed50622ccc2aae5966a114aea8cde6d4cbe7ed1564b1ef3e80b453d

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.aquariuslogistics.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    AQL@2019#$

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.aquariuslogistics.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    AQL@2019#$

Targets

    • Target

      doc07486620200116112353.exe

    • Size

      424KB

    • MD5

      27046fd97f839d57e3c19f66bcbbb3af

    • SHA1

      2773004ab886097ca44cca67b0a87f372f720f21

    • SHA256

      70a7c18aa0fb1b6a542988faad566ef09a748042d6451bb7cd50871ff95e09ca

    • SHA512

      09640209fceb6d80799b3c9a2054d27e02a6066ba03c66b0d4e52baafe2c12b5dc8d92bdd2a3451d9cf839e0c341379066d1e63124589f4f2cb9e7d3af5931cf

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks