General

  • Target

    e5c123f0392b8bedc87c6ffd1c45f8042a686f76e16d777fac5c0390f975d96d

  • Size

    696KB

  • Sample

    220521-nywp3sech2

  • MD5

    746b91af81dc0d8db2c392366372b5fc

  • SHA1

    af79f91a7f22faa5691a3256925da5be645ed46f

  • SHA256

    e5c123f0392b8bedc87c6ffd1c45f8042a686f76e16d777fac5c0390f975d96d

  • SHA512

    2b963de6f5bf34283d93a17dca920c58cf67d9384fc545fdbdd6dc1f081a847349a1002f951f221e508d3d45e0a09b827387f5b3356526ea2fcf56ca6204bc39

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    matt.cashy@yandex.com
  • Password:
    handofgod123

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    matt.cashy@yandex.com
  • Password:
    handofgod123

Targets

    • Target

      e5c123f0392b8bedc87c6ffd1c45f8042a686f76e16d777fac5c0390f975d96d

    • Size

      696KB

    • MD5

      746b91af81dc0d8db2c392366372b5fc

    • SHA1

      af79f91a7f22faa5691a3256925da5be645ed46f

    • SHA256

      e5c123f0392b8bedc87c6ffd1c45f8042a686f76e16d777fac5c0390f975d96d

    • SHA512

      2b963de6f5bf34283d93a17dca920c58cf67d9384fc545fdbdd6dc1f081a847349a1002f951f221e508d3d45e0a09b827387f5b3356526ea2fcf56ca6204bc39

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks