General

  • Target

    203730-gvailantzxexe.exe

  • Size

    707KB

  • Sample

    230704-v6awxahe3t

  • MD5

    00550de2665e6d7cb87ebea46b8b6cbf

  • SHA1

    2021dbd6b56baebe25112e710d3e2497846a6844

  • SHA256

    d385b93c9c93907ce2a86d7bd3a882b2f678cb524235b5fd06ca7b9e523adc70

  • SHA512

    40f2ba9323dbccc7401bf647702c9e3d7de69e96e342d3931570e58009a060301cdbcd4232bcc61283a708f9e50062aa6248509d8ce31e1ee10702b2d4c8db4c

  • SSDEEP

    12288:yhz0LJYBOC9GCxl0Jk+CzTsKM6z/fjtEwkLVygKEo45skoDv:y6LJCdPQKMSjBkAghnu

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    shark.ipchina163.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ID6njP2TMC$O

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      203730-gvailantzxexe.exe

    • Size

      707KB

    • MD5

      00550de2665e6d7cb87ebea46b8b6cbf

    • SHA1

      2021dbd6b56baebe25112e710d3e2497846a6844

    • SHA256

      d385b93c9c93907ce2a86d7bd3a882b2f678cb524235b5fd06ca7b9e523adc70

    • SHA512

      40f2ba9323dbccc7401bf647702c9e3d7de69e96e342d3931570e58009a060301cdbcd4232bcc61283a708f9e50062aa6248509d8ce31e1ee10702b2d4c8db4c

    • SSDEEP

      12288:yhz0LJYBOC9GCxl0Jk+CzTsKM6z/fjtEwkLVygKEo45skoDv:y6LJCdPQKMSjBkAghnu

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks