General

  • Target

    193fec84f61f5a9f9e9198689c1f9b79f6043fb69f5195ffc1e8ceb4a63cecdb

  • Size

    518KB

  • Sample

    230830-t3bhlagh56

  • MD5

    332080a17f495aa0de673c141701be2b

  • SHA1

    da47497733c99f414bd18317dbf95ad467de9c97

  • SHA256

    193fec84f61f5a9f9e9198689c1f9b79f6043fb69f5195ffc1e8ceb4a63cecdb

  • SHA512

    40087532754d92a37a8d8d93377ebed56d856c1ea093c431f8ac6effc40552662ec865c342d06ab27732ecdd5b8bd0c82abf7457d1791cb5913fcbe9878ad25d

  • SSDEEP

    12288:pd32D/O3kEewHH4PZgjMVslTm+7Vx0374K1SzwYOVdGw+dtvFd:pdKG0cHPKW/S8K1SMdGFtvFd

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.sachingandhiarchitects.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    devi060911

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      New Order.exe

    • Size

      1.1MB

    • MD5

      cd1df0d9f454edd8890e7b83dbf1598d

    • SHA1

      1af5a71734083635e1faaeb48da264cf7beef025

    • SHA256

      a901bf5204ca7ac05fe0121f080dad533c29aa7c7092800d380169a8464c0e62

    • SHA512

      a271e9f6c2013aca283cee3ef7a023d3e336c88cdf3b135bb9a0aad0412f7877cb74d54adc9dffcfe695ef6e499ee1b2cab026c3f0c15bd6c30b02fb7d321f73

    • SSDEEP

      24576:MjPTrJVEP2ishe4Q0/fkIGuKTmanoE46q:fY/uTrn

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks