General

  • Target

    bed7309ed7007b0aa5f455f58da65c176438894250030633ff2882152c1b5693.exe

  • Size

    218KB

  • Sample

    221129-rlht8saf9x

  • MD5

    1a20c4f9abb6dfe720fba9cbb5e1a89a

  • SHA1

    a975e1cbb8496d66722685412591e87408881dd0

  • SHA256

    bed7309ed7007b0aa5f455f58da65c176438894250030633ff2882152c1b5693

  • SHA512

    7817c104868690896aea954aefc046ed8a74a1f8d23624338e062498a2c1b9eaaedab5aec6e5ab24ad58946b4e1ab739b79f9bf65662e8441d703fe341023c78

  • SSDEEP

    3072:kaDyAXTqppeFX4oQdJLrEPIK3RvUsbYadix9i9M5k9wwjiXTht3iK767d/vGD:dRseylrJ4UwYaUOMeXiXTLiKe7lvG

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.woxi.cz
  • Port:
    587
  • Username:
    poklopservis@woxi.cz
  • Password:
    88RkoRO35
  • Email To:
    newjoyhappy1111@engineer.com

Targets

    • Target

      bed7309ed7007b0aa5f455f58da65c176438894250030633ff2882152c1b5693.exe

    • Size

      218KB

    • MD5

      1a20c4f9abb6dfe720fba9cbb5e1a89a

    • SHA1

      a975e1cbb8496d66722685412591e87408881dd0

    • SHA256

      bed7309ed7007b0aa5f455f58da65c176438894250030633ff2882152c1b5693

    • SHA512

      7817c104868690896aea954aefc046ed8a74a1f8d23624338e062498a2c1b9eaaedab5aec6e5ab24ad58946b4e1ab739b79f9bf65662e8441d703fe341023c78

    • SSDEEP

      3072:kaDyAXTqppeFX4oQdJLrEPIK3RvUsbYadix9i9M5k9wwjiXTht3iK767d/vGD:dRseylrJ4UwYaUOMeXiXTLiKe7lvG

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks