General

  • Target

    Intels Group Ltd.exe

  • Size

    643KB

  • Sample

    200630-4t9cerx7q6

  • MD5

    1b0ac5f8babe5450f83bd55946271bf2

  • SHA1

    6c8b215aa11656ee3b90998f989049f38bd860be

  • SHA256

    c5980f2bd305fc12792f56357e2ef6fdf7fa3d9971c13bdea539d8ad4af1b687

  • SHA512

    bc84d625de361c0c295aa03d9309086277e09cd60efc3f23f8aea114470ffe35ea74cf1b71295660e6253ab52f555e31b71af039c0518cd6c8dbd6c1a2e19bfc

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.tandempakistan.com
  • Port:
    587
  • Username:
    export2@tandempakistan.com
  • Password:
    fayyazrml

Targets

    • Target

      Intels Group Ltd.exe

    • Size

      643KB

    • MD5

      1b0ac5f8babe5450f83bd55946271bf2

    • SHA1

      6c8b215aa11656ee3b90998f989049f38bd860be

    • SHA256

      c5980f2bd305fc12792f56357e2ef6fdf7fa3d9971c13bdea539d8ad4af1b687

    • SHA512

      bc84d625de361c0c295aa03d9309086277e09cd60efc3f23f8aea114470ffe35ea74cf1b71295660e6253ab52f555e31b71af039c0518cd6c8dbd6c1a2e19bfc

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Tasks