General

  • Target

    A02EF8DADDE0596702F8792A6906320B30E2FA22

  • Size

    451KB

  • Sample

    231121-l2ws5sdf88

  • MD5

    59447e7eb854c5883e64cd6cd2656e11

  • SHA1

    a02ef8dadde0596702f8792a6906320b30e2fa22

  • SHA256

    b90922b5e35d6368d5ae449c45a111323f5d3b883416b0c13df5c1ecaa25d9bf

  • SHA512

    e15881645066bdcdcd69875fde086b6de8ba4f4f5fbf5979a5cffa1f82332d852239f16ddd97475fa40f594a73a594ab80570e07f2c213acac7e077b76cc468a

  • SSDEEP

    12288:74JNW3TamlJANxO5Qa+VppbnoU0o3+c6oI:74JNWjVJA85IpbnoU33ry

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.sturmsgroup.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    hs_B2R1px4ASsOhR

Targets

    • Target

      A02EF8DADDE0596702F8792A6906320B30E2FA22

    • Size

      451KB

    • MD5

      59447e7eb854c5883e64cd6cd2656e11

    • SHA1

      a02ef8dadde0596702f8792a6906320b30e2fa22

    • SHA256

      b90922b5e35d6368d5ae449c45a111323f5d3b883416b0c13df5c1ecaa25d9bf

    • SHA512

      e15881645066bdcdcd69875fde086b6de8ba4f4f5fbf5979a5cffa1f82332d852239f16ddd97475fa40f594a73a594ab80570e07f2c213acac7e077b76cc468a

    • SSDEEP

      12288:74JNW3TamlJANxO5Qa+VppbnoU0o3+c6oI:74JNWjVJA85IpbnoU33ry

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks