General

  • Target

    9693a5652edf480d38ca5bcaa77507f855bcdb373779e2b00a5a05a02efbce37

  • Size

    470KB

  • Sample

    220521-adwyfschgp

  • MD5

    3ad2f9e25957bef30a1ae38cbc174562

  • SHA1

    af4644a05009adca2fc42c6ed7b936b02d6c4eb6

  • SHA256

    9693a5652edf480d38ca5bcaa77507f855bcdb373779e2b00a5a05a02efbce37

  • SHA512

    a98e59b4c3547afc22dbdb6ec1afe93b79e17decc042fc55024de22be8e2d2c8e0dc9efc55db70e489eafb89cd2a9af5ef096e0797ae01c7208c1e3a8916d15f

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.allbayrak.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    VuSfIUj9

Targets

    • Target

      PO-9082020.exe

    • Size

      585KB

    • MD5

      4491b461f590cd8d300fa3dc7458b1c5

    • SHA1

      d2542ef5b265a869f4b74747fa0c8144df13f80d

    • SHA256

      fa8b28f3909cc745b84a3d2c0bbb74d6dab6f97599c3ff367ae296b767418217

    • SHA512

      a53ba47f2503d6f9bbf2aa4ef6abb89732349b709e0e15277388f61cccdfcbeace87b6d7da5828dd8f19b28cc086698fce985b2c2baa27ed790db301c784a146

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks