General

  • Target

    76e4ccf083ffcb4ffb42f9cb962aa86325076bf92c21b967a915e825b4d55a56

  • Size

    490KB

  • Sample

    220521-ne2rzsggar

  • MD5

    6c317f742f79fa026d8ab065dff8d63c

  • SHA1

    8cb44ddc7e8bd47b73fb00c6b24566978530fc1e

  • SHA256

    76e4ccf083ffcb4ffb42f9cb962aa86325076bf92c21b967a915e825b4d55a56

  • SHA512

    e3a5b687be60858b73774874968154ad136ded2a84827a6f589c46878d208b9f20c0baf09a3ba5b64b2a90aa0575f2b103476402422473ebaf8328067ef239bd

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    amblessed22

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    amblessed22

Targets

    • Target

      BCHILE-86712-K41-FPA-000018__REL 0017 BECHTEL.exe

    • Size

      700KB

    • MD5

      70412bb185c9232855032d5ea681f5d2

    • SHA1

      55f0e244005e965fbd0c9355ea4f4f51c824b8d3

    • SHA256

      e51adcf99928f26014b6993369a60a9d4371759f23ddbd4d0df10105ce6de848

    • SHA512

      ab20f06c0aaa1c57fea7b69e28f39a01739feb37e97639ceed29a7a573284081ad582bb5946239e592758c6fc8098e3b52a31e2bb3f4a1387196ca17513d6d81

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks