General

  • Target

    95112bb164cdb2370dfabae70890d42aaa720a0ff162b003fc1e8806930a09bf

  • Size

    169KB

  • Sample

    230306-m23r5abh88

  • MD5

    20fc3e475bc1583e8ebca99d1fd94909

  • SHA1

    5e4b9e143ed3e4a3b96ab33fbb425c5212bce32d

  • SHA256

    95112bb164cdb2370dfabae70890d42aaa720a0ff162b003fc1e8806930a09bf

  • SHA512

    e7a3b99c242d45e689ede38b90762afc8748617d7c11b3f8e2846be254911b7fd37c992e16c0f351d8fc46db08baeb351bf0f19356a83d0698896c27105c828f

  • SSDEEP

    3072:+1vktIWW6IJn4HxUyiL4LOh9mH2QGOryLSFCsceaiYydths:+hkpWTn4fi6OmiO+LWGiZT

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.rockgarnet.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    143Supreme143$

Targets

    • Target

      95112bb164cdb2370dfabae70890d42aaa720a0ff162b003fc1e8806930a09bf

    • Size

      169KB

    • MD5

      20fc3e475bc1583e8ebca99d1fd94909

    • SHA1

      5e4b9e143ed3e4a3b96ab33fbb425c5212bce32d

    • SHA256

      95112bb164cdb2370dfabae70890d42aaa720a0ff162b003fc1e8806930a09bf

    • SHA512

      e7a3b99c242d45e689ede38b90762afc8748617d7c11b3f8e2846be254911b7fd37c992e16c0f351d8fc46db08baeb351bf0f19356a83d0698896c27105c828f

    • SSDEEP

      3072:+1vktIWW6IJn4HxUyiL4LOh9mH2QGOryLSFCsceaiYydths:+hkpWTn4fi6OmiO+LWGiZT

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks