General

  • Target

    572b30c75a8e85b87ec00e12f93f743a.exe

  • Size

    490KB

  • Sample

    230106-l3dc7abc9z

  • MD5

    572b30c75a8e85b87ec00e12f93f743a

  • SHA1

    d32a1e3e696b61d8fa03f3201066782c8f7b16ed

  • SHA256

    f826131b5c356693f53746f0af896eaac4217ef48a1e148759541c21fe29b07d

  • SHA512

    dcd136679267c22aab305d36a18f8f74431e2617121f73af0a6d7d9b17ada7f700929a236782f3e19c5aea30475e7107af17ff9c0026576d7b9867cb6426448c

  • SSDEEP

    6144:GYa6EUS6Eui96sY8Z2a0oHE13N/0Xo9bMJcSd5BC9O54V59qPr2FkEe9SSeG:GYIuzsY8iowmXjJhoOqLqPN0SL

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    hnxqezadblabdsss

Targets

    • Target

      572b30c75a8e85b87ec00e12f93f743a.exe

    • Size

      490KB

    • MD5

      572b30c75a8e85b87ec00e12f93f743a

    • SHA1

      d32a1e3e696b61d8fa03f3201066782c8f7b16ed

    • SHA256

      f826131b5c356693f53746f0af896eaac4217ef48a1e148759541c21fe29b07d

    • SHA512

      dcd136679267c22aab305d36a18f8f74431e2617121f73af0a6d7d9b17ada7f700929a236782f3e19c5aea30475e7107af17ff9c0026576d7b9867cb6426448c

    • SSDEEP

      6144:GYa6EUS6Eui96sY8Z2a0oHE13N/0Xo9bMJcSd5BC9O54V59qPr2FkEe9SSeG:GYIuzsY8iowmXjJhoOqLqPN0SL

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks