General

  • Target

    41570002689_20230609_05352297_HesapOzeti.exe

  • Size

    746KB

  • Sample

    230609-qk384sda5t

  • MD5

    dd329b3815943cb003f5b91d1a68a036

  • SHA1

    4efc8b61727d0831036df2222fd7610d45918032

  • SHA256

    a83423d3a684c1defbb7b445d0594e8074f803fbb4b170a3450e3879aa619886

  • SHA512

    f56656ee53874f0628dc0be7522909ec8cc809a084758f45bff0750d90914713df6c279ec2162bb7f8ebcf6b1ff123ebe3009dd78ddacfc2bbe58cc5eb0598d2

  • SSDEEP

    12288:hNPWR28Le0cY+Yg9fb9XqYCUvCAzJJUo3h3YRa+AzCBFYfx:h5+xL9Rk9UUvCAh3h3bxx

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.redseatransportuae.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    method10@10

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      41570002689_20230609_05352297_HesapOzeti.exe

    • Size

      746KB

    • MD5

      dd329b3815943cb003f5b91d1a68a036

    • SHA1

      4efc8b61727d0831036df2222fd7610d45918032

    • SHA256

      a83423d3a684c1defbb7b445d0594e8074f803fbb4b170a3450e3879aa619886

    • SHA512

      f56656ee53874f0628dc0be7522909ec8cc809a084758f45bff0750d90914713df6c279ec2162bb7f8ebcf6b1ff123ebe3009dd78ddacfc2bbe58cc5eb0598d2

    • SSDEEP

      12288:hNPWR28Le0cY+Yg9fb9XqYCUvCAzJJUo3h3YRa+AzCBFYfx:h5+xL9Rk9UUvCAh3h3bxx

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks