General

  • Target

    Appointment_Letter_ANCASH QUEEN.pdf.exe

  • Size

    533KB

  • Sample

    200630-r8wtr1jg4s

  • MD5

    5ccdf28a6000793b36c564c43c3c81b9

  • SHA1

    f9e5d025419b31d8789efb9b48afbed02c22bdbc

  • SHA256

    09d36fe7fb556c5f30897231a8b0cab021d9fd04896eefc838dbe4dee24eb772

  • SHA512

    cb7e67b612573f2a2556198c437ca9f131c2fa053bba43d6517bb17390c118a85a2d0952022e059bf1328d2ef22d50aeedf106a5910a4880ccefff7ee93be787

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.foodanddesign-lb.com
  • Port:
    587
  • Username:
    yarze@foodanddesign-lb.com
  • Password:
    yarze@2018

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.foodanddesign-lb.com
  • Port:
    587
  • Username:
    yarze@foodanddesign-lb.com
  • Password:
    yarze@2018

Targets

    • Target

      Appointment_Letter_ANCASH QUEEN.pdf.exe

    • Size

      533KB

    • MD5

      5ccdf28a6000793b36c564c43c3c81b9

    • SHA1

      f9e5d025419b31d8789efb9b48afbed02c22bdbc

    • SHA256

      09d36fe7fb556c5f30897231a8b0cab021d9fd04896eefc838dbe4dee24eb772

    • SHA512

      cb7e67b612573f2a2556198c437ca9f131c2fa053bba43d6517bb17390c118a85a2d0952022e059bf1328d2ef22d50aeedf106a5910a4880ccefff7ee93be787

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Tasks