General

  • Target

    98ba6d12a47efec655e2112c9a2727007103ebb37afe8b07fec7ccdbf071c4af

  • Size

    608KB

  • Sample

    231204-h9ecaahf2x

  • MD5

    b3b69978d30ef5c8829f9807346a3bed

  • SHA1

    3573b691af65e891b4d194481b2d04a16e0ce18d

  • SHA256

    98ba6d12a47efec655e2112c9a2727007103ebb37afe8b07fec7ccdbf071c4af

  • SHA512

    c95581b3ef3c6db384da8afe91b6dc2825f9a6e09f1a971e6910e14ced4a27a56b904f3fc20348fd2735436be156bc224edbad22b59fb3d06d723f2dc71f62cc

  • SSDEEP

    12288:pTCbAF6mXRuFQmBZeiB89ApT6M58iioezg23Sp/2/uTH60jrT1:1CbA5RuF1feuOM58ianCp/2GTa6

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.rolexlogisticsservice.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    2u]jWuxLcbdA

Targets

    • Target

      Halkbank_Ekstre_0230622_073809_405251-pdf.exe

    • Size

      682KB

    • MD5

      28e84214d01c73f8ea58167ee4e15245

    • SHA1

      7e35fac510a67e18a382807ed3582488c1aa2a5c

    • SHA256

      f7d7dc0b75fcd11b825c2447278e540332c1a0a927a4559ae9494828fe0d1a88

    • SHA512

      51d151c52ccd481608023a467bf0226a5b290913307d76724025aa0edfaaae0b2f7a17350d8942a8180bfe90466e11f2ce5bcefd377e4aaa52b4cd3ab1dfde33

    • SSDEEP

      12288:TA45+po2KJTXRubQYBBMiB09ApT6M58iSoezgJcDlrLVPjnbwR7KouL8mRfJuO:Tj+pJKdRub9NiuOM58iq8cDlrJbERP+b

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks