General

  • Target

    af9207ab37fb87c6cce4555a08cffcfab37d7b6dc0caa5d04a95c13d83c4f633

  • Size

    376KB

  • Sample

    220520-2wrv1abahr

  • MD5

    0e5eb893c114fb3c79f2870167ad7b1f

  • SHA1

    0bf547321803387887a49f6d1502bc97b71b8568

  • SHA256

    af9207ab37fb87c6cce4555a08cffcfab37d7b6dc0caa5d04a95c13d83c4f633

  • SHA512

    499a343a5d632265568bb546b03a5c033d901f6a597fa1bc0c3327468af844e1dbebfdd89d3441fd3282652bbe240f58d6e0cb56317d2c37584b66bffce67d8f

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.itdone.cz
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    viObavejMa

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.itdone.cz
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    viObavejMa

Targets

    • Target

      New_Order2020.07.03.exe

    • Size

      486KB

    • MD5

      3f718a931a96049d60f8a4055d15235c

    • SHA1

      6c1ccc7510545b90974e945949569c6fd3167007

    • SHA256

      5b3b2cedb97bc0b3e2e011bd59cab0e5be8b6d08824e64476ff2744ec8c7e6ff

    • SHA512

      debc7202edd8240e8c8990aa6b0f64aa73c1466a810d79eac18a6d15e1ba6d86b8220c567fd856bbd304c68f899f0c672d261b014d7efb955f353e88022d0a52

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks