General

  • Target

    117fac29259144eea01437fba5a89e49c773b1d5184c42f3a3735e8d7045f7e4

  • Size

    374KB

  • Sample

    220521-bybzfscff2

  • MD5

    954d11e7a5e8ebdc131ea7c6f6aee3a2

  • SHA1

    261d11b8eb8b99aca2b82cb4fe8d4a53fc2e8562

  • SHA256

    117fac29259144eea01437fba5a89e49c773b1d5184c42f3a3735e8d7045f7e4

  • SHA512

    359b321427a53cfb314836e647fe61c7fc08ce48bce9e77856c689752dfd3b2968a04b8390c50c28251c57ddea97eb5d4b077ab0e7b899732c454817d8c27efc

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.ru
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    princehero1234

Targets

    • Target

      45676576545_pdf.exe

    • Size

      491KB

    • MD5

      01bc7d05b6e6507b7017abee3579738a

    • SHA1

      147377bb8597a119fc318059335ae0f96687f844

    • SHA256

      8883f73f1e34a42362cd116db607dd2cbf33616249a68783ec6a0455b72d8bcb

    • SHA512

      97d413bddf67399c988f0a963dbbae7284e9343ea3ceeb1d8a96eb5a937daf8b61898351e12f5e95a29cba60741d8f0275f4b2988ef2eba26ef4feca79608dcf

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Email Collection

1
T1114

Tasks