General

  • Target

    a060000826711e3815c9c54e3b2e2a2ff203bb5da692ffcc89813ef399f8886b

  • Size

    573KB

  • Sample

    220521-abml1ahhh2

  • MD5

    4790bc05c06a58d9b5a5868438296e3a

  • SHA1

    861b06bba9d837df4dad1a502d1729b45b39c15f

  • SHA256

    a060000826711e3815c9c54e3b2e2a2ff203bb5da692ffcc89813ef399f8886b

  • SHA512

    debae7372f5fcbabfcdcb864c9bb0cdf3986a1e03f2d1e916cde12f9491bf8a1fc1f4c171e39691f684695ee959db24d8b9354e42370c09a7525eab42aee199b

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    blessing2020

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    blessing2020

Targets

    • Target

      Item_list_RFQ#7292020_PDF.exe

    • Size

      754KB

    • MD5

      57891ee94b88b26cd0c764e93893c2a0

    • SHA1

      342020d38ff8e233fa31ac06dbf6f8ee393d3bb4

    • SHA256

      0b85e80e717ed9a5901bcaed1db1f0bca254efb93c024670046bf5abc669d833

    • SHA512

      e1acdf42a0adb5f9d1a7a28895ec652e8cf5f43d8cae47cc3dda45c570c2248eb282b610c7d349ac9428b075d59c6a631b6e4b5013954fabbc22c1ad6d7606f5

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks