General

  • Target

    a3a57df2e00d69ac411881f1a9a00f7795339efe2fb88b6fd3109a8e3982cd16

  • Size

    661KB

  • Sample

    220521-aaxqkshhe8

  • MD5

    13b86df5df8465ea97f2c4c02aef592a

  • SHA1

    a622833d405b0fc1ab3657879895c90c09415f65

  • SHA256

    a3a57df2e00d69ac411881f1a9a00f7795339efe2fb88b6fd3109a8e3982cd16

  • SHA512

    9d4718bf15edd332281bc9fd60c15b11ca5f6c51350eda592287518cb829f224a602b0714dcdf90d80afad193d9b54f09176668f8831356f93642576f39b308f

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.foodanddesign-lb.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    yarze@2018

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.foodanddesign-lb.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    yarze@2018

Targets

    • Target

      FLS 13009490.exe

    • Size

      865KB

    • MD5

      e0ed1b5ff8ac40dd3dc90cab9f5ebea2

    • SHA1

      c549e9529df06b579e71825afb01776f040c40dc

    • SHA256

      26bbae23e7af3110397e04f66aac1c280374e97ee2c90344eef114fa25d86e61

    • SHA512

      b016386d409514088d9415dd5567734fd4cbba41f88adf08e4957e8b800e7c11966bf9c4ad828553e44e53280e00c42c305414cedd88288bd36ffc14054a1760

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks