General

  • Target

    8cb2647b24754e94c09a29438e2f49a2d55f0b772f8f013f5b90dcbfe8f957d8.exe

  • Size

    703KB

  • Sample

    231206-vv9k4afg4y

  • MD5

    e578a1f547aa0fe425455661c09c8191

  • SHA1

    5351a3caa604e8c54c9cddda3886bc21e7785c37

  • SHA256

    8cb2647b24754e94c09a29438e2f49a2d55f0b772f8f013f5b90dcbfe8f957d8

  • SHA512

    350f9dfb4992ecbd88a6318fdd5fac3305c44abf5c2c18b4cac753e42abbf97a9fed8762cdeef11769c3d9855093656fa90fdb308523f86435592c9631df168e

  • SSDEEP

    12288:gHl5nF8dVdqrlbD+aWGXWYkwDOMNQ2luSn0y89inwoa6Y6bxlN6lbHILlzkWV:wlYqhbD+aWfYJ5n0nsav61lNILQlzk8

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.kivuresort.co.ke
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Kivu@2020

Targets

    • Target

      8cb2647b24754e94c09a29438e2f49a2d55f0b772f8f013f5b90dcbfe8f957d8.exe

    • Size

      703KB

    • MD5

      e578a1f547aa0fe425455661c09c8191

    • SHA1

      5351a3caa604e8c54c9cddda3886bc21e7785c37

    • SHA256

      8cb2647b24754e94c09a29438e2f49a2d55f0b772f8f013f5b90dcbfe8f957d8

    • SHA512

      350f9dfb4992ecbd88a6318fdd5fac3305c44abf5c2c18b4cac753e42abbf97a9fed8762cdeef11769c3d9855093656fa90fdb308523f86435592c9631df168e

    • SSDEEP

      12288:gHl5nF8dVdqrlbD+aWGXWYkwDOMNQ2luSn0y89inwoa6Y6bxlN6lbHILlzkWV:wlYqhbD+aWfYJ5n0nsav61lNILQlzk8

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks