General

  • Target

    74ea4075d54f3151e6b3fa44935d3541bcf532775d63d936a36691733886d910

  • Size

    462KB

  • Sample

    220521-al6smaadg6

  • MD5

    6bcb22eae46997b71f3dd53474503787

  • SHA1

    ec211dc08349be20f93662ce9621ec40dd020970

  • SHA256

    74ea4075d54f3151e6b3fa44935d3541bcf532775d63d936a36691733886d910

  • SHA512

    1796e53a04cffb0d1a7ede0b3936be15c00ea1cc4e91d471e7ade3a106989799905fb5d8b46f1add72957b08447bed94a0ff69f2114f14d3c6c2eea07cda819e

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.ru
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Good1234@@@

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.ru
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Good1234@@@

Targets

    • Target

      169287394-75414-SANWVDDNETP0034-3.pdf.exe

    • Size

      568KB

    • MD5

      5d434473eb24eb71a2a6e94c4e6e3c6b

    • SHA1

      64b7fe575fcd9c9a77e42e30cce2e205b2100313

    • SHA256

      3b86298f7b9280b5cb9332c52a36c02386cea08e7b3cef8565bd06cbb08f44cb

    • SHA512

      a9508c35aed0dd637d94c7dfd1373eb59856ce894f1388f438b94a06304c674aeb50db5613c157a62135541e5f1c41e440fffb5bf6107e86666d0c7364d9f057

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks