General

  • Target

    ee724d3cdfb0edeeb3ad16c7c88ae935b7b019b2a49395e6c8b31962177a9cf0

  • Size

    701KB

  • Sample

    231206-c71vlsad87

  • MD5

    c6952f3ce2061453df4b3a7094629e20

  • SHA1

    85b64ee012d5d5949c2a514282e520602d6ff464

  • SHA256

    ee724d3cdfb0edeeb3ad16c7c88ae935b7b019b2a49395e6c8b31962177a9cf0

  • SHA512

    f1d1fb2edadcd23fcfd4e68dc4fd06d50af7d1ad16000c27694e82196d62d4f0446fc34d0f716d9882be2b5c620d50d72a99cba36db723b484ad129617c79fd5

  • SSDEEP

    12288:nnX5nF8ME6jD/MxvN6TXgY0Z7++Dc3nwG4JKM9lJqFxyv+fLuL2s:nXPtD/Mxo0dBX7Sxb0

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.obynnehhhan.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    G$MUuYG3

Targets

    • Target

      ee724d3cdfb0edeeb3ad16c7c88ae935b7b019b2a49395e6c8b31962177a9cf0

    • Size

      701KB

    • MD5

      c6952f3ce2061453df4b3a7094629e20

    • SHA1

      85b64ee012d5d5949c2a514282e520602d6ff464

    • SHA256

      ee724d3cdfb0edeeb3ad16c7c88ae935b7b019b2a49395e6c8b31962177a9cf0

    • SHA512

      f1d1fb2edadcd23fcfd4e68dc4fd06d50af7d1ad16000c27694e82196d62d4f0446fc34d0f716d9882be2b5c620d50d72a99cba36db723b484ad129617c79fd5

    • SSDEEP

      12288:nnX5nF8ME6jD/MxvN6TXgY0Z7++Dc3nwG4JKM9lJqFxyv+fLuL2s:nXPtD/Mxo0dBX7Sxb0

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks