General

  • Target

    ebf649139f5bd13eeeb62fd9c6dcae4a28c218388067938718fc7eb75d021426

  • Size

    487KB

  • Sample

    220520-2vd8hsbadp

  • MD5

    263f50c0b35f1d8436539e6b569a499e

  • SHA1

    467e115e3c6d7fa664552798f30a3636e9283d83

  • SHA256

    ebf649139f5bd13eeeb62fd9c6dcae4a28c218388067938718fc7eb75d021426

  • SHA512

    dfff1e4d7f54c6e613fdb6c7b89dad713420d37a6d09a122bce1713e64b5b9479272a36e266154a4c2ae131096c2b71f07894698cae4e3634c40dc451005547f

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    kingmoney12345

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    kingmoney12345

Targets

    • Target

      Packing List.pdf.exe

    • Size

      715KB

    • MD5

      aaf4e659d4938d1173348105650d7755

    • SHA1

      1b47c37120b880ddc95ef650a7ebc04673db41e1

    • SHA256

      d99680b269d345d0e78e80b5310077f35e781ab5e74a1f926cb0be47d185a9c4

    • SHA512

      6f9ada9632c2ab5c3e2cd97e11099a67b05e2c5050917e3df0aa913c179c817d39029838c8e47ce234eb1e592217c4674edc1f8ad1534b40b75d8ca91b4008a7

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks