General

  • Target

    4219085.exe

  • Size

    793KB

  • Sample

    220316-gvxdwagbfp

  • MD5

    0dacbb28cef175c1e01560fe18e3ee70

  • SHA1

    61b84862a70a43ef54ffe00b8c15cb192e9d79a8

  • SHA256

    9dbaa30f9fbccd0821c136557992a8dfa6e1c92af89aa637807f18db7a7e7f78

  • SHA512

    38abff21af4afd5939da8f7332169d665b47a57e0fd7357716d1ea942868e260878f51312ff22c216f071c5d5cdcb92ab80e6acc7c2df77e98300c62c4df29db

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.escueladeseguridadmaritima.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    JUsatelite2020

Targets

    • Target

      4219085.exe

    • Size

      793KB

    • MD5

      0dacbb28cef175c1e01560fe18e3ee70

    • SHA1

      61b84862a70a43ef54ffe00b8c15cb192e9d79a8

    • SHA256

      9dbaa30f9fbccd0821c136557992a8dfa6e1c92af89aa637807f18db7a7e7f78

    • SHA512

      38abff21af4afd5939da8f7332169d665b47a57e0fd7357716d1ea942868e260878f51312ff22c216f071c5d5cdcb92ab80e6acc7c2df77e98300c62c4df29db

    • suricata: ET MALWARE AgentTesla Exfil Via SMTP

      suricata: ET MALWARE AgentTesla Exfil Via SMTP

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks