General

  • Target

    xKaSZLLbDICqMBAcPJhCTslrsAUoXfnEFrf.exe

  • Size

    214KB

  • Sample

    221209-m67xmsda53

  • MD5

    36bd05e59f6a73cde67245428c43466e

  • SHA1

    b10d41b2a69986894978dc1cfc5329d493fa27c7

  • SHA256

    dec571b8aec70f2c629e6231bf7f7c2962954ffc186db5b2f8e3eabfc45f11f5

  • SHA512

    3eba141711684bfbc6b3a2ba4a528a06141704a63f56a95610167414fd744fa357edde42b253fa5a7276d383797df262a0441d7d2cde9ac4e7f700d790ca9a17

  • SSDEEP

    3072:0GWEVfkf9iHSkcxJ6lA9Us/y63a8z5R6mpmATXNCsIfrqap8iIPdHwSqGCywtWps:0ISk4JAsUp65Gm7LkppVGdQSrfUW

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.gettoner.com.mx/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    fedxunited543@

Targets

    • Target

      xKaSZLLbDICqMBAcPJhCTslrsAUoXfnEFrf.exe

    • Size

      214KB

    • MD5

      36bd05e59f6a73cde67245428c43466e

    • SHA1

      b10d41b2a69986894978dc1cfc5329d493fa27c7

    • SHA256

      dec571b8aec70f2c629e6231bf7f7c2962954ffc186db5b2f8e3eabfc45f11f5

    • SHA512

      3eba141711684bfbc6b3a2ba4a528a06141704a63f56a95610167414fd744fa357edde42b253fa5a7276d383797df262a0441d7d2cde9ac4e7f700d790ca9a17

    • SSDEEP

      3072:0GWEVfkf9iHSkcxJ6lA9Us/y63a8z5R6mpmATXNCsIfrqap8iIPdHwSqGCywtWps:0ISk4JAsUp65Gm7LkppVGdQSrfUW

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks