General

  • Target

    25a1ed4595e074cf8f898b5a0e505809372991f805aec43f205c254e8d1ec91d_JC.exe

  • Size

    315KB

  • Sample

    231012-sjmwvahh25

  • MD5

    5f7cb94f4ab08ee714d801d8cdb10342

  • SHA1

    1eee64e698b780a13ab21d1dfb31a4dbeb43901b

  • SHA256

    25a1ed4595e074cf8f898b5a0e505809372991f805aec43f205c254e8d1ec91d

  • SHA512

    9346aa9910d012d926a2c6e7622797e3e4e2c7479514c64db037a4aea777bfcdede3875be3b4024366e96f6f86140c6b5c29209d623ad1b3b93a2a221960eb55

  • SSDEEP

    6144:rbJyFMhIorW0wFndl3Swqk6/d1FPCiDPXcEfiu+kPHZnT:rUF4I0w4wqk6/d1FPVP/6TkPZn

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.felluceisi.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Ffkonya2018x

Targets

    • Target

      25a1ed4595e074cf8f898b5a0e505809372991f805aec43f205c254e8d1ec91d_JC.exe

    • Size

      315KB

    • MD5

      5f7cb94f4ab08ee714d801d8cdb10342

    • SHA1

      1eee64e698b780a13ab21d1dfb31a4dbeb43901b

    • SHA256

      25a1ed4595e074cf8f898b5a0e505809372991f805aec43f205c254e8d1ec91d

    • SHA512

      9346aa9910d012d926a2c6e7622797e3e4e2c7479514c64db037a4aea777bfcdede3875be3b4024366e96f6f86140c6b5c29209d623ad1b3b93a2a221960eb55

    • SSDEEP

      6144:rbJyFMhIorW0wFndl3Swqk6/d1FPCiDPXcEfiu+kPHZnT:rUF4I0w4wqk6/d1FPVP/6TkPZn

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks