General

  • Target

    QUOTATION # 104833.zip

  • Size

    518KB

  • Sample

    221012-r7k7gsgag4

  • MD5

    c3acf9f907b02489d9f99940d0bc15ee

  • SHA1

    10c852a225609ca826b2d6d0c71727bff71fa89f

  • SHA256

    ecdc2003e37905dda94e809adaf0b39c9ce3ab31610f3f049ab851887f11a01a

  • SHA512

    cc33a8fd1417968fdb0e681c8b04e3d78c8e6d781615b6b1edc84475245b8ee04d915001e396ea5bb5d4ad99bd71d1ba09fb565f66018699f53baa6b180fe478

  • SSDEEP

    12288:IUidLeGeAFrtR1Ir5A8m+kBAJUK0nyrGYBIpj16mP7aj2kijA:I7l0A8mjBAJ2yrWj16Iaj0jA

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.bluemaster.es
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    F5a&T4w&

Targets

    • Target

      QUOTATION # 104833.exe

    • Size

      813KB

    • MD5

      ee347a7f1ae2bce6ebbee3aa38e8dced

    • SHA1

      77328846ea31e9739b1b477ae1dc15730544ff16

    • SHA256

      dba5df5d3e28bc3de4a3961fd90f28342dc4955022df5ca83354e9f9b4fa4af8

    • SHA512

      4b932ed26bdeb42b24951ef0ff00867de17bd71f49fbc374ed4a1ea278eb5aece660f35a47048ef221284e816f144f586ba3f95387ee0e23b0d25827bd6f91f4

    • SSDEEP

      12288:PsSZLA7jcpdbdbdbdbd9rfR1mj5A84+kXAJUQ0nurGYBI3j16mt7aj2kDeM2vd7:lZQKBBBB/YA84jXAJuuruj16kajMN

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks