General

  • Target

    SOA pdf.img

  • Size

    1.2MB

  • Sample

    231103-q83x9abg8y

  • MD5

    3f624d66d034cc0b47e1cc90f620293e

  • SHA1

    6dd1e425054ab1471676cee7860288cae2248507

  • SHA256

    a36f044f83511535a62d1187b10d5c92bf557cd07bf85f36519330c04712bb66

  • SHA512

    3c864ba53a9a4eb5664fdf0caf08698d2763688fb66864f5187d7f88f1633a8f4122f209c3ac043553d2c2e1325b6cc1f6d9e7a3b60960a8fe0ba506fa203a89

  • SSDEEP

    12288:tsxTA6q+YIItbIqt8qedaQ5ZmAhXRwIY2NKJGCkui1iDjUqO24XhvMsK6Ed3:yxs66btEM8d42Y+6/kKjGhEsgd3

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.sitraco.org.ng
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    chiso100%800mili

Targets

    • Target

      VF8LYKLS.EXE

    • Size

      732KB

    • MD5

      7ec536edfb2f45676b6ca798a49d8dd4

    • SHA1

      5b57cac279a60ddc904ec639dcacecdf70b504f5

    • SHA256

      8efb5396b4a7e5fea2644c844c1ab7e000b8ce9cafdc1c7172d480731f16c8fc

    • SHA512

      f68c666087e93f3b8f6246566d2f85502931715da91ee20e9f18250452b52a74009b885b88979a984dfe689ff300a1d7a375b1ce66d404edaa69b4ebe4095549

    • SSDEEP

      12288:GsxTA6q+YIItbIqt8qedaQ5ZmAhXRwIY2NKJGCkui1iDjUqO24XhvMsK6Ed3:Jxs66btEM8d42Y+6/kKjGhEsgd3

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks