General

  • Target

    Payment proof.zip

  • Size

    538KB

  • Sample

    230426-gxab5ahd4y

  • MD5

    025d48bf212a0d8cb8e204240750673a

  • SHA1

    c36e4764f8efbfb5dea7c39cc0ff2a6d7c660e42

  • SHA256

    8aa96715a5b46b901e8c8f881f49b9b731aab6287bd6680decf9a8d0d0b5855c

  • SHA512

    c5b362a12bdd461cb7691a9f379e5e269bb08c17336fc305f53f8a81707e68eb045aa5250220baddf02489ada326d8c2ce7d348a5a59469f5f5418e8319b73f5

  • SSDEEP

    12288:SiKy+r9wWEo+/uQoorB4IC/8ob0KWy/BtTsBov4Zc:Xt+x8aeB4Ic8obfWwBJVQZc

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    cp5ua.hyperhost.ua
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    7213575aceACE@#$

Targets

    • Target

      Payment proof.exe

    • Size

      697KB

    • MD5

      770c4a7155b97c9ae3d3063b549be236

    • SHA1

      a03ba8d2304f7f9bfbb592e0b4890705931aee28

    • SHA256

      19c8294fa46bf25f304b34352f274c4ef8271ed913ceba438eff4db2cabba5b7

    • SHA512

      4163476d132052ddda57b683bcb34b15d2b6650a7ead32a02559d8a27ad4dd0f6b3cd38452507fafda6238bba6be8481ab214d6a30860c2997eb889bea3b5bdf

    • SSDEEP

      12288:NbSJgvm6ikDZcWcTHLW3D5POOgfG54IC/p2vNx0KWy//GgZx9jMD:NbSJgvm6ikSTC5eu54IcuNxfWw/5Zx9Y

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks