General

  • Target

    edekonthtml.exe

  • Size

    353KB

  • Sample

    231205-vt1xkada31

  • MD5

    89d8e33862254ab0164efaf6efbaff1c

  • SHA1

    68f019bca5d212d7c6dacecc320c188ed91bb6df

  • SHA256

    ccd1a1a8894135d74b09b38078cb1c74310a32640be2db9c14957edd830f0bff

  • SHA512

    d8e5fc48150ed622e9b883cbe55f496a489fa1761300ef0dbda41abe21af2d95b3b4b3ee308bc64de6197979f74675840de6f1248387481abd866e40bdefdd47

  • SSDEEP

    6144:QBlL/wyXteRAe8yHzoXERIC20hNTcYa9MpETitvyhbduzQJ2183Ozrjm4Rm3W4nG:iuAteRAe8m2FV0hNTVGMssvyhbdu0g1t

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.nmsltd.com.tr
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    nms190019

Targets

    • Target

      edekonthtml.exe

    • Size

      353KB

    • MD5

      89d8e33862254ab0164efaf6efbaff1c

    • SHA1

      68f019bca5d212d7c6dacecc320c188ed91bb6df

    • SHA256

      ccd1a1a8894135d74b09b38078cb1c74310a32640be2db9c14957edd830f0bff

    • SHA512

      d8e5fc48150ed622e9b883cbe55f496a489fa1761300ef0dbda41abe21af2d95b3b4b3ee308bc64de6197979f74675840de6f1248387481abd866e40bdefdd47

    • SSDEEP

      6144:QBlL/wyXteRAe8yHzoXERIC20hNTcYa9MpETitvyhbduzQJ2183Ozrjm4Rm3W4nG:iuAteRAe8m2FV0hNTVGMssvyhbdu0g1t

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks