General

  • Target

    cb0a75d00fa97462bb89a0be5fac87de4803c5b61755092253c7cf9af6e40fbe

  • Size

    383KB

  • Sample

    220520-2v4s6sbagk

  • MD5

    d3086ac2616df83859239431e24b14e1

  • SHA1

    923147739dac2979092c33ce4f4470c2a34eeb16

  • SHA256

    cb0a75d00fa97462bb89a0be5fac87de4803c5b61755092253c7cf9af6e40fbe

  • SHA512

    34dff77e77538d557301c50dfc0e96516c3fb411de3d14e3c785dedb722df7c47254a67dba3df0a670550820dfb8d7e7da64eb738176bccb56833e56f11d83c6

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ikechukwu112

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ikechukwu112

Targets

    • Target

      Shipping Documents.exe

    • Size

      425KB

    • MD5

      9def0c53033f12c2c2d5bc429fcfa887

    • SHA1

      38172df5f24838ea85074eec4194d8f6a67d591d

    • SHA256

      48c961dc9ce3260ac71aedb77eb999606e804d7563d6877d26c12f7cb57860d3

    • SHA512

      03264ba3e4fb97c5f94fd42f8ea153e7b85805f4ab5bff1c0d9ff9e8980a3ab4edc4f8479a81d99b0a039a4a079831a73d58ea90d0a3f51351d9d802035220c2

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks