General

  • Target

    39333245b387ca36aa73c4187b6f76164acbc064437c01615db3e07b2b6ad194

  • Size

    705KB

  • Sample

    231207-bgjyqsgddq

  • MD5

    f053a47878eef34856213ebe703762f5

  • SHA1

    6b9c63310ece0ad7641487a2b22d3d50e8c3e5cf

  • SHA256

    39333245b387ca36aa73c4187b6f76164acbc064437c01615db3e07b2b6ad194

  • SHA512

    f25115672f99020e6834fead356e2e07b6986baef31fed4ebc6eec71f56043ba8ec6f657582b967c8b272843f866e9998b183ec3421709f3f04e24845e3efe38

  • SSDEEP

    12288:CYueH5qnUs76lZQXIccU2tkcLaft5UkK3somDfmhSuidqc84D1Rj:Csq8lZQXIc90krVBK3OuLc1xRj

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.turathmall-ksa.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Julliannah123

Targets

    • Target

      39333245b387ca36aa73c4187b6f76164acbc064437c01615db3e07b2b6ad194

    • Size

      705KB

    • MD5

      f053a47878eef34856213ebe703762f5

    • SHA1

      6b9c63310ece0ad7641487a2b22d3d50e8c3e5cf

    • SHA256

      39333245b387ca36aa73c4187b6f76164acbc064437c01615db3e07b2b6ad194

    • SHA512

      f25115672f99020e6834fead356e2e07b6986baef31fed4ebc6eec71f56043ba8ec6f657582b967c8b272843f866e9998b183ec3421709f3f04e24845e3efe38

    • SSDEEP

      12288:CYueH5qnUs76lZQXIccU2tkcLaft5UkK3somDfmhSuidqc84D1Rj:Csq8lZQXIc90krVBK3OuLc1xRj

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks