General

  • Target

    cabb6fdf10c577b6d529be65a4e5154dd53e67570d305da21ad39c03f67ce3bb

  • Size

    827KB

  • Sample

    231205-dbvjdshc36

  • MD5

    23284d731a5f245ed50c262c6bd783c8

  • SHA1

    ec77a6f42091861b7544d611d9b01d5c761c44c8

  • SHA256

    cabb6fdf10c577b6d529be65a4e5154dd53e67570d305da21ad39c03f67ce3bb

  • SHA512

    e62c33552d5f8e866c8b58a1cc5220c06c653b0dd32f8329b62716e81d2958edd734f4e85903e124db0589ed1bca6d9e695d5337ba80f7162ba14dec53eeec62

  • SSDEEP

    12288:YWctW8G34/uK45+po2K6YoTmnCS+TZQnOlEs12xIZkrUHCqDRKRoUaggA+X+neXL:534/up+pJHY9L+lQtsY21KCFfXNXL

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    webmail.vector-kl.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    IzzaVectorKL202)

Targets

    • Target

      cabb6fdf10c577b6d529be65a4e5154dd53e67570d305da21ad39c03f67ce3bb

    • Size

      827KB

    • MD5

      23284d731a5f245ed50c262c6bd783c8

    • SHA1

      ec77a6f42091861b7544d611d9b01d5c761c44c8

    • SHA256

      cabb6fdf10c577b6d529be65a4e5154dd53e67570d305da21ad39c03f67ce3bb

    • SHA512

      e62c33552d5f8e866c8b58a1cc5220c06c653b0dd32f8329b62716e81d2958edd734f4e85903e124db0589ed1bca6d9e695d5337ba80f7162ba14dec53eeec62

    • SSDEEP

      12288:YWctW8G34/uK45+po2K6YoTmnCS+TZQnOlEs12xIZkrUHCqDRKRoUaggA+X+neXL:534/up+pJHY9L+lQtsY21KCFfXNXL

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks