General

  • Target

    7e7883f19c5b2dbf9eb6d817e1e624e00e2989bf221d8524dd43ced86e1faa82

  • Size

    250KB

  • Sample

    220520-2xvy2sbbdm

  • MD5

    09072d67f57f1087c0c17234401dfb25

  • SHA1

    0596584d99f402403895f45e9c08060f11ff6344

  • SHA256

    7e7883f19c5b2dbf9eb6d817e1e624e00e2989bf221d8524dd43ced86e1faa82

  • SHA512

    f4ce9c5da064ea4350a45b3824a31616b310ae8a04201939c7b33e9a187cb5d085f5854090c3ff6a54c8dddd8d4ab741ec253c0c2acbe2cd30ff90de8050fbcb

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ALIbaba123

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ALIbaba123

Targets

    • Target

      PO INOXIA-2020082.exe

    • Size

      424KB

    • MD5

      3fb4cb29f6380861a446414eb3896dd7

    • SHA1

      eadbaa5085257c286e87c734a7ff14972e8fecd8

    • SHA256

      9018fc4955a89ca4996540770fb9d7ed349810b9e4f6724ade1be9c6288015ed

    • SHA512

      397373793eaeaf47e970e5b2b64b9b49ce27b8e4022a4dc7ffd7f65f9869d023f6b8050d8917e21b9dd6cdef553a1aafa6b68f7983ccba181690f5d045abcd21

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks