General

  • Target

    Advice Ref.[G91222721471].zip

  • Size

    696KB

  • Sample

    231206-rh4brsfb68

  • MD5

    f6345d0b933a06a23fe9ca217467cc4b

  • SHA1

    21ed92b2013127f8b237f9c1c2a5409486419759

  • SHA256

    01de7df3860e7ad4f19ed18c2067e2f3a917edc738449f19288afa12598d8e3b

  • SHA512

    6130e1a577d17687cb35326c53f0659be9c10e5f5d3d07e5dced04655e46c9c6c36af09c3d764688ec19eb8a4b6bdd7f87e32d4093a2ee7b581eea5381167f5f

  • SSDEEP

    12288:gbWjTABd2iEcR6MJzYj0q8jkN20wbX27S8wXB6bT9ppyExiF5Z5R5J50Z0FA1O4a:OWAP1EcREjj8E+yu86KTXHiF1R5o0ia

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.kivuresort.co.ke
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Kivu@2020

Targets

    • Target

      Advice Ref.[G91222721471].exe

    • Size

      805KB

    • MD5

      08ee0d72de9475ba957cd2688b5ac25f

    • SHA1

      45ee3e5fb6b05118508a15e9c6ff60b1a5e68664

    • SHA256

      446bf403bee494bb174ee63f34ac2a839587450d508b3205ae6b65ac4db80375

    • SHA512

      dd67c8f01259a4562c03b849eac5a51b978f8c8252ffcc32d27c475d54cabc47fcaea8e75da8e35e5421f45ec7526944b7c8758f8e8542dee0f200646daca7a6

    • SSDEEP

      24576:QtKtD/61IAwGmGuq7c8+Dj09HnY+fgPH:f6KAd3F7t+09HYK

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks