General

  • Target

    a7b896518c2fdbf9d11705a3bd40498ad8bcce14628cbd53d0f6573e7eb4d5e1

  • Size

    401KB

  • Sample

    220521-ncybsadea7

  • MD5

    8296a56567646890563ea91a7819d74a

  • SHA1

    5cb8900dd0015ea908f6ecc17e4251a1fdfe86fd

  • SHA256

    a7b896518c2fdbf9d11705a3bd40498ad8bcce14628cbd53d0f6573e7eb4d5e1

  • SHA512

    379d5755125c2ef13ef2e7141ad0d8ae7a8cd554e48107f1ce95e9d87598752d2498cb089ca717bf2299beb7c991a74f6040bce6a62a8f44f23b4542a71782fd

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    chukwudi123

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    chukwudi123

Targets

    • Target

      Swift-Copy.exe

    • Size

      453KB

    • MD5

      0143475673f7d2c7cf67f572d2ea0a85

    • SHA1

      2e0b4d086f790c4a6a82c272959e8e03edb1e81e

    • SHA256

      e41919d249e5accf006955d7b4a67f55ec3fcedd66283b25f9a220af94248150

    • SHA512

      e18aa330682468d7251888a925d20f60bc13fae7c9b3c6b1b53989451d44aa7f3c6857dd9a1a62f4d892e41794ee0ddb8b09c988a30b0c1836f6fcaff3ece646

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks