General

  • Target

    NEAS.fde64d4dc5380ed10f542faed0cff120.exe

  • Size

    966KB

  • Sample

    231021-1hdksaea38

  • MD5

    fde64d4dc5380ed10f542faed0cff120

  • SHA1

    a99ea5580bf30c96c20f4cc9a76aa79fc4112e6e

  • SHA256

    0520905ac30bb0045ca74556986ac5bd21192089c74f70eed6d08f2365c03a47

  • SHA512

    1f6280a1191ededb95e226322e0f63f6bc3dcc3c310c4a395ae920000f831d6863dfcf612531d58adba785c429a97084310157d246b8512fe4c1b3fe9094ea58

  • SSDEEP

    12288:k8pq0lDBzoneExZt77jUbnokJ75uUdpxbWGB7TfqDgb:+BZt77jELEUjxbWGB7TQq

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.sofahaus.eu
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Conobo13$$

Targets

    • Target

      NEAS.fde64d4dc5380ed10f542faed0cff120.exe

    • Size

      966KB

    • MD5

      fde64d4dc5380ed10f542faed0cff120

    • SHA1

      a99ea5580bf30c96c20f4cc9a76aa79fc4112e6e

    • SHA256

      0520905ac30bb0045ca74556986ac5bd21192089c74f70eed6d08f2365c03a47

    • SHA512

      1f6280a1191ededb95e226322e0f63f6bc3dcc3c310c4a395ae920000f831d6863dfcf612531d58adba785c429a97084310157d246b8512fe4c1b3fe9094ea58

    • SSDEEP

      12288:k8pq0lDBzoneExZt77jUbnokJ75uUdpxbWGB7TfqDgb:+BZt77jELEUjxbWGB7TQq

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks