General

  • Target

    f2551af7103589ef0c6302fba59c0c3c1e1c0c500a343aa4932aca59ccc37efb

  • Size

    1.2MB

  • Sample

    220520-2t7hnsbadj

  • MD5

    240a10c205c9fd62d58405518f3c7b18

  • SHA1

    337557535a0940c404f7a72a62d096a9ddde6ef6

  • SHA256

    f2551af7103589ef0c6302fba59c0c3c1e1c0c500a343aa4932aca59ccc37efb

  • SHA512

    e8e0a982c8aff9254fc4fd96dcdc19268ab2b4814a76213041c33985daf28d03268b4941a5de6e42efb3f08e36d191697930311d2e2fe69d82ed0aa4f3c63d6b

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.ru
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    chika12345@

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.ru
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    chika12345@

Targets

    • Target

      SWIFT__C.EXE

    • Size

      405KB

    • MD5

      76e2b77b8945a9d50034405c520fad02

    • SHA1

      6645d985c7a50f7bf5bb1c49716e18f6af7de6ca

    • SHA256

      516b18a120eb6f6380a7df0ff52def508e3da5e79b12a60647cc438e478e3363

    • SHA512

      946aa476a2905bff089bb5fc6ade46f0d4b3202bfc34ca876be40dfd42729cda4556b6960225bef41c126fa206271c970e6d2e8bd7f641307e699169349820ad

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks