General

  • Target

    SecuriteInfo.com.Win32.PWSX-gen.5152.22186.exe

  • Size

    752KB

  • Sample

    221129-jgd2gsce6x

  • MD5

    1d67fa81fe2db1c22a732922a0156974

  • SHA1

    71c8984a5cfcb1d1fbe918128bb2186d22afa83b

  • SHA256

    da0cd9ef9c9d409ee82e7d6e2ac1e06a806c128b2ea97ecc80443ceddbea04ab

  • SHA512

    4408c56538bcdcc251118d3fd8c9e5deb752f3c988ce42252782042cf5b3a5e8dc0caa4e4aa1ec398bdb7f471d8397c8647e47ad11a424b2c67b106bc177db10

  • SSDEEP

    12288:2mlujzwC3ckxlQ1too9zpC7odQ+6Hrv5AKSfmfRMEalkVYzbbQjevXGhGj:2mlujzwC3xxq1yszpCkfcSfAVVYvbQwz

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.akademetre.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    st6473

Targets

    • Target

      SecuriteInfo.com.Win32.PWSX-gen.5152.22186.exe

    • Size

      752KB

    • MD5

      1d67fa81fe2db1c22a732922a0156974

    • SHA1

      71c8984a5cfcb1d1fbe918128bb2186d22afa83b

    • SHA256

      da0cd9ef9c9d409ee82e7d6e2ac1e06a806c128b2ea97ecc80443ceddbea04ab

    • SHA512

      4408c56538bcdcc251118d3fd8c9e5deb752f3c988ce42252782042cf5b3a5e8dc0caa4e4aa1ec398bdb7f471d8397c8647e47ad11a424b2c67b106bc177db10

    • SSDEEP

      12288:2mlujzwC3ckxlQ1too9zpC7odQ+6Hrv5AKSfmfRMEalkVYzbbQjevXGhGj:2mlujzwC3xxq1yszpCkfcSfAVVYvbQwz

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks