General

  • Target

    3b8dec23bd3b985e4172e317f9d9d7f5d02f48ac308646714c83f237dc5eae05

  • Size

    629KB

  • Sample

    231023-mmpa7afg9t

  • MD5

    6aa0a83ae8a3878b82f332f789af1987

  • SHA1

    0e940b8c35363b00401eb96c4ac3a7331f551644

  • SHA256

    3b8dec23bd3b985e4172e317f9d9d7f5d02f48ac308646714c83f237dc5eae05

  • SHA512

    79d5c13e4f42d50e087d9cea99f10331aed708b3434a8f4401af604452bd66b26ea898a5fbe6e37141ebf1aaf5d6b3cc51196b6710ac996cf5c8d2b1db13f7b3

  • SSDEEP

    12288:sexQ476ApDMhJVcXcGk1XsaZ+ehhlBe1TtY5RDjF2hiF6TV/GRsxTNvhn:semRWQ3VmTOZnlmTYdFIiF6xr1N1

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.gimpex-imerys.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    h45ZVRb6(IMF

Targets

    • Target

      Updated Quote.exe

    • Size

      667KB

    • MD5

      1d8dc3d606d29697bac8ce321caf1634

    • SHA1

      f193b06b50d066b12c647f050850602eccb1fb73

    • SHA256

      17611abf986bbc0bcee43bc5ba5d7fb3a6c8af3b09343016e8dc4a149884b92a

    • SHA512

      a9c3e515ad2f6187a61499f0871c4049475f8f2ef1f65096813f0729e2b1936ce49f8773a565225eff0787c961a2248d13783ed3f50078960f11721c92d7ae33

    • SSDEEP

      12288:BhNh6sxTA6qNhSh6/kFcXccXs0Zceh1ly5XdtWPWF0D9EytAB/2h:BDDxs6g44omlZFl/c0KyOE

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks