General

  • Target

    613ec38e8aa3a86fca3c825a8fb3cc1997a1e1401e5b9acba5daff668a01c2f9

  • Size

    816KB

  • Sample

    220521-aq2pgaafd8

  • MD5

    e382c7e8037335dd4e623163755701ac

  • SHA1

    fec1ee14f1e9096e47c596743b1856862d99e8c2

  • SHA256

    613ec38e8aa3a86fca3c825a8fb3cc1997a1e1401e5b9acba5daff668a01c2f9

  • SHA512

    f40b523d5eb7a11e01d5b94dd241cf7c7ce2b1ff41c48e72f7a1d14107974e7d1ad59cf424a06879e42db0489c338cde1a44191a43b13d7a3d174c6b6b85cea9

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.elittacop.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    @eaSYuc8

Targets

    • Target

      ch1.exe

    • Size

      763KB

    • MD5

      cf29a15b9d5764c1033b13a3b0861e36

    • SHA1

      423229cd1c7617856349e9931f35d962bde55ba0

    • SHA256

      bdbf27545d51eb4fa15659002a993ed3cb377279a6671d72051aa70a9cda189e

    • SHA512

      0991c07a3ddf3cdbf514d0ca9cbe6f605fe0b5715ddb288b0f54e23bd1ece1fe9f9b5bb51ccf709993e75fe38d20bf17f2f0ec21bd09ccc00df352ef08ce19d9

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks