General

  • Target

    PO_26000.EXE

  • Size

    641KB

  • Sample

    230605-qvfksshd8x

  • MD5

    77d935d7e77112bb388ac03a5042fc6a

  • SHA1

    d0944027701d8a1b4d5ca03244c0bd110babfce4

  • SHA256

    8c1b654ffeeca024e8f3dea708c7e55cb7e1be72b5316c35ba9bc5b260d63f03

  • SHA512

    289ecafa584e1bc23d82dbd9271c45234cd281f1fa23ea9b7dd4b0edd8fc677038980e0a0b315ab23070ae4eb033e432b586d15a0a8aa281c30700b4050c35eb

  • SSDEEP

    12288:O2N8jiZ4zypIPsItPplTY6RhKuV/m2XOCVmUg5OoqjezjyLJsapm:O2N8jiZ4zypIPsIJTDEg/IfOopzL

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.fiziopet.si
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    KuzaPazi2020

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      PO_26000.EXE

    • Size

      641KB

    • MD5

      77d935d7e77112bb388ac03a5042fc6a

    • SHA1

      d0944027701d8a1b4d5ca03244c0bd110babfce4

    • SHA256

      8c1b654ffeeca024e8f3dea708c7e55cb7e1be72b5316c35ba9bc5b260d63f03

    • SHA512

      289ecafa584e1bc23d82dbd9271c45234cd281f1fa23ea9b7dd4b0edd8fc677038980e0a0b315ab23070ae4eb033e432b586d15a0a8aa281c30700b4050c35eb

    • SSDEEP

      12288:O2N8jiZ4zypIPsItPplTY6RhKuV/m2XOCVmUg5OoqjezjyLJsapm:O2N8jiZ4zypIPsIJTDEg/IfOopzL

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks