General

  • Target

    dbb832a8e39eadb4dff92c86785f16fc52682f8acfe0a831a4ce8b6a958e93ea.exe

  • Size

    280KB

  • Sample

    231202-k715dabb6s

  • MD5

    9e60f887ca21af01d0c370a94d4e73d3

  • SHA1

    fadc53d73ba72988eeec272d0076ad6dcdd0c680

  • SHA256

    dbb832a8e39eadb4dff92c86785f16fc52682f8acfe0a831a4ce8b6a958e93ea

  • SHA512

    9be22718a4810b4e5a8b01f098b241a84824ac5cb31bf28558e581e788759cad94ff20289acf60b84ee49fa0c8b5afcf4559795e1e84cb19c38b2a60d12b3612

  • SSDEEP

    3072:oQ53wnXOm8tSA4M/msYWkVHF6++4mNMa9W6dfukJL4G5e911rIV3tQZ+vXoxltnV:oQ53COs5W3cG5eRUVRvyepzo

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mailbuilderbuilder.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Alluminio.1

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      dbb832a8e39eadb4dff92c86785f16fc52682f8acfe0a831a4ce8b6a958e93ea.exe

    • Size

      280KB

    • MD5

      9e60f887ca21af01d0c370a94d4e73d3

    • SHA1

      fadc53d73ba72988eeec272d0076ad6dcdd0c680

    • SHA256

      dbb832a8e39eadb4dff92c86785f16fc52682f8acfe0a831a4ce8b6a958e93ea

    • SHA512

      9be22718a4810b4e5a8b01f098b241a84824ac5cb31bf28558e581e788759cad94ff20289acf60b84ee49fa0c8b5afcf4559795e1e84cb19c38b2a60d12b3612

    • SSDEEP

      3072:oQ53wnXOm8tSA4M/msYWkVHF6++4mNMa9W6dfukJL4G5e911rIV3tQZ+vXoxltnV:oQ53COs5W3cG5eRUVRvyepzo

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks