General

  • Target

    ec550aefc2e181061c23fb13952c24e7de75dbd547238119095912baeec139f0

  • Size

    564KB

  • Sample

    231107-s7cqsacg45

  • MD5

    d2bf350ea2e4e615d26a7d7b99ee2033

  • SHA1

    fe17671068b271d67c6eed8ae151b230291677f2

  • SHA256

    ec550aefc2e181061c23fb13952c24e7de75dbd547238119095912baeec139f0

  • SHA512

    5f42ccb2bb4c51029268055915d03280b0e162a571deffdef4e43764f6781f6f27b375ab9d0b23532f640fd1b4b96630ede39e7543caff957bf08b9a8b3bf27b

  • SSDEEP

    12288:BQ3v8jldr5biRmEiPeINX32+v333OKvs7OvsD4jPzEfuaRU:Iuf5ymNPbmKeKvs9D0PiuT

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.lubdub.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    J-y!2e_fWMH_XP8F_008

Targets

    • Target

      Remittance Advice.exe

    • Size

      582KB

    • MD5

      8d2126ae79aef51c34567fa4031e504c

    • SHA1

      99724725807731fdba5b82abb3f060092e46a1ef

    • SHA256

      4936f57a5372bb5ac361fe78e175e350be8dcb551f1df710e37516f9530f93de

    • SHA512

      fcb35ca2bda59d6ac4bca54fa3003a7037284c861d70f9ffe6c5264678c79f1fd39f92c7dc7409458bb45eaa787f0ca49f0b4f5030e0b9bf64b632bddac69da3

    • SSDEEP

      12288:JcRbVjtXUY5HiPe6Uv33zOAPs74vsD4je99AtLVPa:J+bR5UHYiAPsLD+tLVP

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks