General

  • Target

    9ab49e156a81c33a68cc1a9988a1da4c724429c44f8bfa96fb2a158fb5c9a51f

  • Size

    515KB

  • Sample

    220520-2w382abbar

  • MD5

    4b531850c7bb702fa187f25bf6a57d2b

  • SHA1

    b9aa26667476e87fea44aa8c93a025a26de14055

  • SHA256

    9ab49e156a81c33a68cc1a9988a1da4c724429c44f8bfa96fb2a158fb5c9a51f

  • SHA512

    856935c7618402fa506714aa5483bcc6c2c329a1062cc65e47e277d4da49326bc0adb1f8ef22df166e84c30919108e485b5869052b0604329f4b15de537a0f2d

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.ppmm.or.id
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    nasiuduksutrisno12345

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.ppmm.or.id
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    nasiuduksutrisno12345

Targets

    • Target

      Purchase Order.exe

    • Size

      744KB

    • MD5

      9e61c38349562bac4b28cc1bb00ecf74

    • SHA1

      3ea11383595c3ab3fa78ba9a5c55382e5d33ff44

    • SHA256

      9592819cdc450184fb43c9686103f9955acb5a71e3dcded2d223e7af609b7db0

    • SHA512

      03a5d3db17b48279d9684c1358bfb190adc1614a830ff9d59e29094b07d014c1f7376a08113ddfa14932338508d74d904718ad60225225db282df314fbde2c1c

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks