General

  • Target

    tmp

  • Size

    673KB

  • Sample

    231002-yhgakaga79

  • MD5

    26ef5df5466f83b5db24a2a917a62257

  • SHA1

    64da3842f3c467cfbb877deb6b4f5b820a761e63

  • SHA256

    02a2a2779ecd2cd887b97930a56fa5c8977a0d8fec04d06bf3fb65acb418fe9f

  • SHA512

    4eb04187b6d67769165b81043f8aa4b23c055cbb0bddcb9a255d5551d5840c91df169c9e91d273adc010f4e01699a2ff613af1b04f2371a3fabf9f5d86029df9

  • SSDEEP

    12288:wpmNumB0appp6t7kiQ9xcBUYBZKB3mteAhaUKFcEyuRZh5u6eg7lZtyBp8WAp:oty3DMBUYBZKZmteAhaUwXRzdlKLq

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    cp5ua.hyperhost.ua
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    7213575aceACE@#$

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      tmp

    • Size

      673KB

    • MD5

      26ef5df5466f83b5db24a2a917a62257

    • SHA1

      64da3842f3c467cfbb877deb6b4f5b820a761e63

    • SHA256

      02a2a2779ecd2cd887b97930a56fa5c8977a0d8fec04d06bf3fb65acb418fe9f

    • SHA512

      4eb04187b6d67769165b81043f8aa4b23c055cbb0bddcb9a255d5551d5840c91df169c9e91d273adc010f4e01699a2ff613af1b04f2371a3fabf9f5d86029df9

    • SSDEEP

      12288:wpmNumB0appp6t7kiQ9xcBUYBZKB3mteAhaUKFcEyuRZh5u6eg7lZtyBp8WAp:oty3DMBUYBZKZmteAhaUwXRzdlKLq

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks