General

  • Target

    hesaphareketi-01.exe

  • Size

    659KB

  • Sample

    230922-qgmrysaa96

  • MD5

    8115ada57f7a00d6fa797f5ad28d3270

  • SHA1

    faa0942225a1692836b97dd6b0262d57bc8008b1

  • SHA256

    c0251e3f1226fad0b3c19e8a99c12d8689d1b6b7357f7138aa0ad450519e351b

  • SHA512

    383b064f307f889fd3b5adbfbe77664c8c8d66a8404ea466821badd53be5753810d000c3545af18141405f128e90537a14f65ad00b53d9b571d96c229d8ba7cd

  • SSDEEP

    12288:+tHiCrD6AUPGBCcP3JfjMi8NUppO8LFa6twMvp+Vcm6h9Nsj5ahN5jo:BQDlBCQfjSUppPLF7twMsVcmW9N848

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      hesaphareketi-01.exe

    • Size

      659KB

    • MD5

      8115ada57f7a00d6fa797f5ad28d3270

    • SHA1

      faa0942225a1692836b97dd6b0262d57bc8008b1

    • SHA256

      c0251e3f1226fad0b3c19e8a99c12d8689d1b6b7357f7138aa0ad450519e351b

    • SHA512

      383b064f307f889fd3b5adbfbe77664c8c8d66a8404ea466821badd53be5753810d000c3545af18141405f128e90537a14f65ad00b53d9b571d96c229d8ba7cd

    • SSDEEP

      12288:+tHiCrD6AUPGBCcP3JfjMi8NUppO8LFa6twMvp+Vcm6h9Nsj5ahN5jo:BQDlBCQfjSUppPLF7twMsVcmW9N848

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks