General

  • Target

    400_8812838.rar

  • Size

    853KB

  • Sample

    221103-ybtbjsgebr

  • MD5

    2d5f374e6f3b40fc5c58e89a21ef92e9

  • SHA1

    567a85430889057a27b4c43719478fc9c9b08eaa

  • SHA256

    9dab0724ed5e7cbc44472f1c2e5c08f98c9b8f094b4644520c452ad2a5b79c7f

  • SHA512

    7c047e571b87ff45ccc453c5542d493f03b1d46e83595543242774f2df4c747a732ee8577ed531775a47af9f380bfe3d788bbb3c99f037f206855188a102a384

  • SSDEEP

    24576:jSZpxjOR8cmVs692NGhwWjO5bPBm9g0Ki8eU41TLnMu:KpJOuW624wD5bEi88eU4xLnr

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Logistics@1234

Targets

    • Target

      400_8812838.exe

    • Size

      1.1MB

    • MD5

      b04022f9a65ce8062ac786d4acdc4fe4

    • SHA1

      b6b3e8f45d85451365c5b9403c2a02396d4a650d

    • SHA256

      66aa4ea4ba5c8984d16f01d28456202191ccf94ed14b4ece7ded515524d8c397

    • SHA512

      123fb4ced1335cd62f5420358c9eb55c364691959151ec0fee57f3efadac0b1c0d83ae97fff406bb835156835419d57058409154bb066a6efaed71cf4af32f47

    • SSDEEP

      12288:/TEleJMQPWrNZs1dxk8iGwhuJvzps7OcUu8wldYomjWMP52J5SNpgjcF75:tJNI8dxkRuJ1s7ou8c7SNpgYFN

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks