General

  • Target

    f54d769e9290f1882ae085da919f734b6ce3cc36a8b879233b07f7d4a3121e7b

  • Size

    888KB

  • Sample

    231201-bht54adc76

  • MD5

    4088310104f79131c438cabacf0b6edb

  • SHA1

    815320a8404024788e1d29a3d52e17d21de8181c

  • SHA256

    f54d769e9290f1882ae085da919f734b6ce3cc36a8b879233b07f7d4a3121e7b

  • SHA512

    5627b97d3e80fca610300b8b9f65a49a2bc4a6e179d219ec422c60932aa26ddf6c994e485db971e1a5a9ec5f5bdeb42a55d8a75cd7d7310145d1018b228eb88e

  • SSDEEP

    12288:ug0SHdr/2DzVbI421wLFtA+yG0+G3Lc1N9FLRlwR:ZX92zlIx1WtArG0CRF

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mailbuilderbuilder.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Alluminio.1

Targets

    • Target

      Scan_20231130_085902_pdf .exe

    • Size

      827KB

    • MD5

      5388a9eda1698bab204e57054a0df83e

    • SHA1

      9319e5125e5274a4cd75b2e239f7167da01c9a9e

    • SHA256

      ecfe6f56c220473c0f1730960e907f103e893c3778155d3f675ebbce4621b61a

    • SHA512

      a89586e40461d913a6bad7e3499dc7c441d9db465bb331c458e02884d24ee862234398de8006bbe374e766ba0d96d970ff467c6a1bc1b8bee933547c543f2bb4

    • SSDEEP

      12288:wg0SHdr/2DzVbI421wLFtA+yG0+G3Lc1N9FLRlwR:fX92zlIx1WtArG0CRF

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect PureLogs payload

    • PureLogs

      PureLogs is an infostealer written in C#.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks