General

  • Target

    86e4d942eaadae137e4730335406fe6f40cf5ee188b1c53b06cfb1e9a8033eb3

  • Size

    453KB

  • Sample

    220521-ahjtpadbej

  • MD5

    84c516d86bd07bbc404afc3031437e0f

  • SHA1

    5a8b41de4464f031c4dd2ce6361fd84845cdef5e

  • SHA256

    86e4d942eaadae137e4730335406fe6f40cf5ee188b1c53b06cfb1e9a8033eb3

  • SHA512

    e36b378400f0c6d9ed42e9d2c91b486ab75941b3f98684f9398dfb608284ef4a9264286a72471a705f4751e426b5638798f05daa8295f5b4ae3c049a0945e2da

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    kelechi12

Targets

    • Target

      UXeLnG40fQKjVMO.exe

    • Size

      564KB

    • MD5

      317e3a35af7cf8c2084ee8d996fa5af5

    • SHA1

      cb1ef60d0971c53ddb36240886797e8a14155d7c

    • SHA256

      6b6c3c4778e2ace06259417b71dee51867d17fcc1a23ac4c779fc83b08c853ec

    • SHA512

      ac05e610858a855f8fccef5dc4bc2beda07cd71c7c09725c07798533c9f4280b3eaa15ae6b428e500c1c9e2d90a633903c34298216a07ab066b08652c6d6520c

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks