General

  • Target

    cd60a81d712e4f278be1650bc5d8b5bb.exe

  • Size

    696KB

  • Sample

    230424-rykvcseb51

  • MD5

    cd60a81d712e4f278be1650bc5d8b5bb

  • SHA1

    f049a6b0c4ea73a0ff10aa8a2469b9782a0d51b8

  • SHA256

    baecc5ff2030bae2c7bbefd317d15f0a0c9934e3366993f78f920918b6fa675b

  • SHA512

    9994d21acd35417f1734f584566b984a8a41661d1eba2d71f8fc9eab5d7b93408473738214f07b1f0f9650a9e29424615dc76d9ca8ff5448aefca409809648bb

  • SSDEEP

    12288:2gjjPkCS32h/800n4H6IHdVhyOdwO3IpKvOTSMz2AYZZ3WObvUEnzKIJTIFPSew5:2gjjPkCSGhE056ayCGLZbOmOwEnmSe

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    cp5ua.hyperhost.ua
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    7213575aceACE@#$

Targets

    • Target

      cd60a81d712e4f278be1650bc5d8b5bb.exe

    • Size

      696KB

    • MD5

      cd60a81d712e4f278be1650bc5d8b5bb

    • SHA1

      f049a6b0c4ea73a0ff10aa8a2469b9782a0d51b8

    • SHA256

      baecc5ff2030bae2c7bbefd317d15f0a0c9934e3366993f78f920918b6fa675b

    • SHA512

      9994d21acd35417f1734f584566b984a8a41661d1eba2d71f8fc9eab5d7b93408473738214f07b1f0f9650a9e29424615dc76d9ca8ff5448aefca409809648bb

    • SSDEEP

      12288:2gjjPkCS32h/800n4H6IHdVhyOdwO3IpKvOTSMz2AYZZ3WObvUEnzKIJTIFPSew5:2gjjPkCSGhE056ayCGLZbOmOwEnmSe

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks