General

  • Target

    492755b80d1081ba131a439da2ccfa06.bin

  • Size

    859KB

  • Sample

    230601-bpbx4acc8y

  • MD5

    e59a6ab240b5660f7d8167c476909828

  • SHA1

    f984b7711ea4ce3f0045b76d0aed5227539b0b5d

  • SHA256

    84af3dd463c7185df5959c694471d0cd57481e371710e7fc858cc56f2551d57e

  • SHA512

    e8284e6cf9c214a2b8f173a1d7cc5db42a90f7f7a890c555c6c83b07b2ea4212b702e9778344c1d6007f4aa3cf343a382505c4ee3cfbb428eaac8e79cbb2f58b

  • SSDEEP

    24576:8cYss62UVbPfFrH4HM1Rdy35Z6zehxTJhCM3oW:8/h62UzYuvQT6Sr9R

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.redemed.xyz
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    workhard123#

Targets

    • Target

      a9f736db3605228043d1d98f0a3e56d853336d25d06aec27b720c82dac015c57.exe

    • Size

      956KB

    • MD5

      492755b80d1081ba131a439da2ccfa06

    • SHA1

      1e7df1d1bfd37cb32b2c436a672a6efcde3571b1

    • SHA256

      a9f736db3605228043d1d98f0a3e56d853336d25d06aec27b720c82dac015c57

    • SHA512

      4010f520e7e27a7024bd2126c0cf510f558fd725f91967b3c2c4d2bbd340dc25f0148c8e5354cb3fe56eb4aa11480fc4f60712d89412c2ff716ef37724cfc027

    • SSDEEP

      24576:AwLaVUH999mR7JsQ8B40dyc8S6AX2NI5j0ZpgWa:PBH9mR7J7C4HcFl822O

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks