General

  • Target

    397e51f9b8a9a61de32f21b12d23334dca268c256d9024cfe4fb3605bd9c4204

  • Size

    560KB

  • Sample

    221205-zntcrafa65

  • MD5

    fd7e78554f7753561700462daec31af7

  • SHA1

    deb03e6c64b6c44916c73d180bf1a4d593363695

  • SHA256

    c858c0c7f6d7ef781f0db36384a038377ae388781d0e9d93653554c05d6c0afc

  • SHA512

    fcc4810e888e05e0468c7541f39f9d3e863de8792a1248c4ada1272d7f8f3498a8d020b6017d693f7d05b1171e00a2a5880896ddc416e90f4b8158dd5b9c1c8f

  • SSDEEP

    12288:mkKN9Um9cjO42FMeLXg7xWhmwIta0/jmp9FKG0QBBzX68:Pe9wO4KXGxpwryaHBdXf

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    hnxqezadblabdsss

Targets

    • Target

      397e51f9b8a9a61de32f21b12d23334dca268c256d9024cfe4fb3605bd9c4204

    • Size

      628KB

    • MD5

      04172d4b087c8dac6fdb91053b6b443e

    • SHA1

      1fdfab48af8c0c9044601b9ccdefdb26702b8aa8

    • SHA256

      397e51f9b8a9a61de32f21b12d23334dca268c256d9024cfe4fb3605bd9c4204

    • SHA512

      617ebf7ef2af8d2110acedd81dfdc1f3519e73f5352cfd5276ea14652b97115018bb022868dbbedf995cea02a67a3c3966eaa19a93e0935d6abcbeef9a8324b1

    • SSDEEP

      12288:G+NEDj+9UI94nOGmFmiLXgHxW7mwItay/lmprFKG0yBBzXLxd:GPj+9iOGqXMxZwrUMVBdXLxd

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks