General

  • Target

    d975348bc9e2938f9bbb8f8c96f20cbc74c0241ef9e0847a853233fd962f73fa

  • Size

    944KB

  • Sample

    230306-1kw5xafa27

  • MD5

    0ad5f09b242a0606e12c70df87b60e20

  • SHA1

    0ffac097abdb16b4c8e7dc83ac1e63de46233b3c

  • SHA256

    d975348bc9e2938f9bbb8f8c96f20cbc74c0241ef9e0847a853233fd962f73fa

  • SHA512

    afd72efc7019b90e247e6ab5afea168c8082375f3fe69f29b2a203c0f6f648a3e19569efc68a7ced438205f831fc0e8cfcf4b4299c0fa958c9e6334a87b6a8c0

  • SSDEEP

    24576:GOnD9hh7bnab+5/mEYsrgtVS719y4UPe1DutEySDDqFcIEPR/PsG:Fz3cEB

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.gonnamokgroup.org
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Gonnamok2018!

Targets

    • Target

      d975348bc9e2938f9bbb8f8c96f20cbc74c0241ef9e0847a853233fd962f73fa

    • Size

      944KB

    • MD5

      0ad5f09b242a0606e12c70df87b60e20

    • SHA1

      0ffac097abdb16b4c8e7dc83ac1e63de46233b3c

    • SHA256

      d975348bc9e2938f9bbb8f8c96f20cbc74c0241ef9e0847a853233fd962f73fa

    • SHA512

      afd72efc7019b90e247e6ab5afea168c8082375f3fe69f29b2a203c0f6f648a3e19569efc68a7ced438205f831fc0e8cfcf4b4299c0fa958c9e6334a87b6a8c0

    • SSDEEP

      24576:GOnD9hh7bnab+5/mEYsrgtVS719y4UPe1DutEySDDqFcIEPR/PsG:Fz3cEB

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks