General

  • Target

    211c7f7ad00add16625f448bd69b70c5054f50f0ec1979e56425dd75b69f85e5

  • Size

    618KB

  • Sample

    231207-r8cxhacc73

  • MD5

    8a6c155385b42e0e96e831a9caad63fb

  • SHA1

    a303f3bdd8f8a2e80b859ac493143df90c658bd0

  • SHA256

    211c7f7ad00add16625f448bd69b70c5054f50f0ec1979e56425dd75b69f85e5

  • SHA512

    395e9b21d34b1853d54ece10fa1e37218887126088e15540c1ebd244c4f0781157c1057ff60d9ac4666c16ee2344d0bd968b3c145312d48bd04636ec40a77ecc

  • SSDEEP

    12288:tytsJ8EzwTvCepfd3nDPOuVLtT3PoH2GvQc5KoyOKiRPBal40nmFUWB77:mqepdXDPtZtLoNvnEiRPk6r

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.pharmapanel.com.ar
  • Port:
    587
  • Username:
    dcarrizo@pharmapanel.com.ar
  • Password:
    Pharma23Panel90
  • Email To:
    fundsslim185@gmail.com

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.pharmapanel.com.ar
  • Port:
    587
  • Username:
    dcarrizo@pharmapanel.com.ar
  • Password:
    Pharma23Panel90

Targets

    • Target

      211c7f7ad00add16625f448bd69b70c5054f50f0ec1979e56425dd75b69f85e5

    • Size

      618KB

    • MD5

      8a6c155385b42e0e96e831a9caad63fb

    • SHA1

      a303f3bdd8f8a2e80b859ac493143df90c658bd0

    • SHA256

      211c7f7ad00add16625f448bd69b70c5054f50f0ec1979e56425dd75b69f85e5

    • SHA512

      395e9b21d34b1853d54ece10fa1e37218887126088e15540c1ebd244c4f0781157c1057ff60d9ac4666c16ee2344d0bd968b3c145312d48bd04636ec40a77ecc

    • SSDEEP

      12288:tytsJ8EzwTvCepfd3nDPOuVLtT3PoH2GvQc5KoyOKiRPBal40nmFUWB77:mqepdXDPtZtLoNvnEiRPk6r

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

3
T1552

Credentials In Files

3
T1552.001

Collection

Data from Local System

3
T1005

Tasks