General

  • Target

    Samples & specifications.rar

  • Size

    459KB

  • Sample

    220926-w9b4tacggl

  • MD5

    4e93d83cd7a8650fa7c9fc2161872a7a

  • SHA1

    d8a6504a788d608c6d331c9ed2439eb7ce4eb26c

  • SHA256

    73c264494766fdc3eaf30eed3b18fc37886ff1c8390a75365bcd0b53f44172d0

  • SHA512

    6b78f1dcaba99e78bb8af14d9a3745d916e7549ab304531377432e50b60e986cd09ad6d7e3017f402f1b8278531bdb4855ec135b35c798edb25cc9bf849e1000

  • SSDEEP

    12288:rl34xCytuAIClSQEE9xK/k8Y0kvpRmw4E:rJ9ytxICzl

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.teknovateplas.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    tekmktg2020$

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Samples & specifications.exe

    • Size

      645KB

    • MD5

      30ac8be3e172337e371c4f43c7d416e6

    • SHA1

      b02b65ad7894a0cd4efa79eb3da0b3cad94c3887

    • SHA256

      62ef7325e09f2a3b30ad5891e477cee7e16f28e82be13cf1fc38743d47735d27

    • SHA512

      1ad17697b176332b7aa1e32d02dde3ca9c7d9998cdbc13f1d32dc7b14c7b4edb47c4c57718e07a70420ba69e5d4dd9e834bc9ab183aa19bffa49a53faefa3940

    • SSDEEP

      12288:Xc80bF2zUbhL2KnM66aTvcsvDLlylSx1fK1emiPk+dLFQxRCamdJIobFXAQEzC5g:Xb0bF2zUbNdnMp0

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks