General

  • Target

    3bff4f95cc537a4ad075931d288e21a0640a1764a29a40f0b3ea0d89f54635a9

  • Size

    16KB

  • Sample

    231206-eph8ysba57

  • MD5

    3271e7b2a99808a2a39538a7f6eb2c7b

  • SHA1

    af893da71b2e896282ba8d02ae62243c7439ecfe

  • SHA256

    3bff4f95cc537a4ad075931d288e21a0640a1764a29a40f0b3ea0d89f54635a9

  • SHA512

    595ca5f8c99aa1df20e6e8131e71a30d8d4e7bfef537ad355126bd94966210e35aab13d249c844ddd8f9cd36f2717139a2f95f51b8b0e885081927cbbc57f3da

  • SSDEEP

    384:ByX9Iw6WNs8PL8wi4OEwH8TIbE91r2fRXJYEvifjv2jtt:Bc9c25P3DOqnYJ5dvejv2pt

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    cp5ua.hyperhost.ua
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    7213575aceACE@#$

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      3bff4f95cc537a4ad075931d288e21a0640a1764a29a40f0b3ea0d89f54635a9

    • Size

      16KB

    • MD5

      3271e7b2a99808a2a39538a7f6eb2c7b

    • SHA1

      af893da71b2e896282ba8d02ae62243c7439ecfe

    • SHA256

      3bff4f95cc537a4ad075931d288e21a0640a1764a29a40f0b3ea0d89f54635a9

    • SHA512

      595ca5f8c99aa1df20e6e8131e71a30d8d4e7bfef537ad355126bd94966210e35aab13d249c844ddd8f9cd36f2717139a2f95f51b8b0e885081927cbbc57f3da

    • SSDEEP

      384:ByX9Iw6WNs8PL8wi4OEwH8TIbE91r2fRXJYEvifjv2jtt:Bc9c25P3DOqnYJ5dvejv2pt

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Abuses OpenXML format to download file from external location

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks