General

  • Target

    1672-67-0x00000000043B0000-0x00000000043E8000-memory.dmp

  • Size

    224KB

  • Sample

    221208-qz3acsab76

  • MD5

    af1cf1393b3f78784a3c88348c22c9d1

  • SHA1

    3a138db9917c84d4854a6b62a90bbf67d5dfddd2

  • SHA256

    23e533e2956c82346e8b8eef23abc801713a6d96e34b488937c9346e300ed691

  • SHA512

    0c711321d4929dc462d6db42402adfc82456621b9120f6878997591888708e7ea184f8c8e42ac28e1c75388eb182548f039933fc3f0c28a7ba32617bb4ed4f66

  • SSDEEP

    3072:zJ89MLHabeiLOD4KYgpvHmJOU5HItNDa6+kmJro/MsoeCGLcNysSigbJIPDqi:SKLGKPoOU9ItNDl+kmxoUHTmigb+P

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.majestictravel.gr
  • Port:
    587
  • Username:
    accommodation@majestictravel.gr
  • Password:
    !acc#@541@

Targets

    • Target

      1672-67-0x00000000043B0000-0x00000000043E8000-memory.dmp

    • Size

      224KB

    • MD5

      af1cf1393b3f78784a3c88348c22c9d1

    • SHA1

      3a138db9917c84d4854a6b62a90bbf67d5dfddd2

    • SHA256

      23e533e2956c82346e8b8eef23abc801713a6d96e34b488937c9346e300ed691

    • SHA512

      0c711321d4929dc462d6db42402adfc82456621b9120f6878997591888708e7ea184f8c8e42ac28e1c75388eb182548f039933fc3f0c28a7ba32617bb4ed4f66

    • SSDEEP

      3072:zJ89MLHabeiLOD4KYgpvHmJOU5HItNDa6+kmJro/MsoeCGLcNysSigbJIPDqi:SKLGKPoOU9ItNDl+kmxoUHTmigb+P

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks