General

  • Target

    ucheoriginnnnnewww.exe

  • Size

    209KB

  • Sample

    221017-p7apmsbhb8

  • MD5

    909256f587bfeae382516074f8991086

  • SHA1

    cb719a062ff18c88e936c5dbc48d615d25ad2153

  • SHA256

    f84a0e979752a6309f9a05665487db73434d3b1713290ff7ce0baf57e5609527

  • SHA512

    eadab8ddb75a0904dd476cf69c149bc94d74ebf9e04bca6fabe6a18d5775b01dd48f1278ef355a6c65bacd0949211c6526b4d79545f5419d82798e31d3918ebc

  • SSDEEP

    3072:cqDIKvNpao8O+PQmsr+yt66oSQ+Ur8FHzj9rLOx6X/S+msCQoEl1mZZYZoafiF:tD509srDtIgUr+Hzj9rvq+lNVWa

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.fsqglobal.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    icui4cu2@@

Targets

    • Target

      ucheoriginnnnnewww.exe

    • Size

      209KB

    • MD5

      909256f587bfeae382516074f8991086

    • SHA1

      cb719a062ff18c88e936c5dbc48d615d25ad2153

    • SHA256

      f84a0e979752a6309f9a05665487db73434d3b1713290ff7ce0baf57e5609527

    • SHA512

      eadab8ddb75a0904dd476cf69c149bc94d74ebf9e04bca6fabe6a18d5775b01dd48f1278ef355a6c65bacd0949211c6526b4d79545f5419d82798e31d3918ebc

    • SSDEEP

      3072:cqDIKvNpao8O+PQmsr+yt66oSQ+Ur8FHzj9rLOx6X/S+msCQoEl1mZZYZoafiF:tD509srDtIgUr+Hzj9rvq+lNVWa

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks