General

  • Target

    eb19924832dd33b6fe9d20c11dbd1a864affa2a2bd82453c2881ba4de1337893

  • Size

    675KB

  • Sample

    231207-cxhw2sghbn

  • MD5

    4c1c7d4bc8e0ca126f09aaca64cedd98

  • SHA1

    2e067f48bb321dc8f29284990ac78d27b5d53689

  • SHA256

    eb19924832dd33b6fe9d20c11dbd1a864affa2a2bd82453c2881ba4de1337893

  • SHA512

    9ae8ad3d841e93f0bb2eddc2f5acb0815de31dc9375c9f0c8fc282839097f8af94f6f7161e97093b506280a61a08db5f658b19a1217cedc7007169e3c74fb515

  • SSDEEP

    12288:OnaIULtH/wKm9JqSvYyxVPrZLdi2bdgvkBotHln4uvwwIFcF61Gq:OnIeKMLrVzqM9SL4O61T

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.privateemail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Facebook123.

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      eb19924832dd33b6fe9d20c11dbd1a864affa2a2bd82453c2881ba4de1337893

    • Size

      675KB

    • MD5

      4c1c7d4bc8e0ca126f09aaca64cedd98

    • SHA1

      2e067f48bb321dc8f29284990ac78d27b5d53689

    • SHA256

      eb19924832dd33b6fe9d20c11dbd1a864affa2a2bd82453c2881ba4de1337893

    • SHA512

      9ae8ad3d841e93f0bb2eddc2f5acb0815de31dc9375c9f0c8fc282839097f8af94f6f7161e97093b506280a61a08db5f658b19a1217cedc7007169e3c74fb515

    • SSDEEP

      12288:OnaIULtH/wKm9JqSvYyxVPrZLdi2bdgvkBotHln4uvwwIFcF61Gq:OnIeKMLrVzqM9SL4O61T

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks