General

  • Target

    15600e560db916a375f9b3630c197649c49ca9c0d6ae88b5b539449e1e68e518

  • Size

    166KB

  • Sample

    220521-d6ljzabhfk

  • MD5

    f0aa0e5d541375ad9d43b843fb4e6829

  • SHA1

    4f13b95af0966f82363db654e51d23fc5a07249c

  • SHA256

    15600e560db916a375f9b3630c197649c49ca9c0d6ae88b5b539449e1e68e518

  • SHA512

    477d0dd080f618429dbef75c182b93ca3f03c170a334f2d9448d5c4a078d0eeb0b23ac6ab352e8b7c45652e63f13326948e251a7add69884b2f7500960405792

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.mahavirint.in
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    pratapjain

Targets

    • Target

      SOA JUNE.exe

    • Size

      278KB

    • MD5

      579dbd7afd440e6a10a8b5d272c7c2a8

    • SHA1

      2bd47ba70ec1d1016fbf221fe7195ccb7d114f53

    • SHA256

      79d51a9e744eec6fdd7ccb78990d82fece2221773065e45989c85c87485ba741

    • SHA512

      4217581d5e014dfffdf2e6b0106bece38881a31cb8f7cd02c7310178983942627e699536182b212d898510b4b5b1cce7702d41ab8e75ccc9a1522f17024ae4da

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Drops file in Drivers directory

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks