General

  • Target

    e135bfe8e4f06d55fb579924d4b5783bfbc8ab29566141ae2890d6a17463c658

  • Size

    566KB

  • Sample

    220521-ceplwadgc9

  • MD5

    ee35642d423168313ba26cfdaae7a204

  • SHA1

    e2f10815a7e1081acc8ab6e27f0a2f2b113f4d7f

  • SHA256

    e135bfe8e4f06d55fb579924d4b5783bfbc8ab29566141ae2890d6a17463c658

  • SHA512

    cec35cecc45edad1465ec1f66a07bf0299bbb0424d62163eabeeaaf409c087d7b8afa4e625e52b81cc36b9c59e51f98910ef6a9d7f1f2b606674a895e934161e

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.mosaiclayouts.com
  • Port:
    587
  • Username:
    sales@mosaiclayouts.com
  • Password:
    UY$W4+]^+9;)7CF5

Targets

    • Target

      Order_list for Quote.exe

    • Size

      504KB

    • MD5

      44f7145fac997f144a95bba1213c319a

    • SHA1

      2e917b9ed34e878a96a62b5c00882e249fa53dea

    • SHA256

      f4d9dcad2e93b4affe2794ceda8a78fbed46306127727eea472431e49d567c77

    • SHA512

      5ebd3db9edceda20663506182381e248dabc87cab9842004f4c93fa64d3e12f4ff51a5f246669bff91a79e9918b95630eda67866157b4817bf7fa608d488d0b8

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • CoreEntity .NET Packer

      A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

    • AgentTesla Payload

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks