General

  • Target

    cargo_023354663.exe

  • Size

    741KB

  • Sample

    231120-hm25tsfa3x

  • MD5

    d33d4e3f2ee5d8629f2deedbdbfe5199

  • SHA1

    f3ca6f75cba4394e2b52792c12bd0988673e7560

  • SHA256

    3d05623da2f66ee7073d88d4e4703551e779a136d0296f8d4073c52c93a469a0

  • SHA512

    8d45ba0ea829b88ac6fbadfc1e04cf9f0afd3f173f9bb68b422dabaed8f339cf05dee237530335d2d2ead25ae097d4ebec99173364f03eef460583ff0d8e469b

  • SSDEEP

    12288:6elc5Fqrvh3ukGR8FFkbYJeu+yk5uvlWwjFLGTe/+SSS3sOiVdiaPVm+Z:yfuvRVMcflcOCicJZ

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    cash@com12345

Targets

    • Target

      cargo_023354663.exe

    • Size

      741KB

    • MD5

      d33d4e3f2ee5d8629f2deedbdbfe5199

    • SHA1

      f3ca6f75cba4394e2b52792c12bd0988673e7560

    • SHA256

      3d05623da2f66ee7073d88d4e4703551e779a136d0296f8d4073c52c93a469a0

    • SHA512

      8d45ba0ea829b88ac6fbadfc1e04cf9f0afd3f173f9bb68b422dabaed8f339cf05dee237530335d2d2ead25ae097d4ebec99173364f03eef460583ff0d8e469b

    • SSDEEP

      12288:6elc5Fqrvh3ukGR8FFkbYJeu+yk5uvlWwjFLGTe/+SSS3sOiVdiaPVm+Z:yfuvRVMcflcOCicJZ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks