General

  • Target

    5f010877aa2a19af0395aa9faa351df8d2c13ab68b61063e34edfe17c2d75a0fexe.exe

  • Size

    638KB

  • Sample

    231207-yc45fafa35

  • MD5

    10477de164af2dd3f724c2ae1a24a98b

  • SHA1

    499746a12043721b7e08985087b54ee23f7f8903

  • SHA256

    5f010877aa2a19af0395aa9faa351df8d2c13ab68b61063e34edfe17c2d75a0f

  • SHA512

    1fb8a8a14f340103b9547ff65896b36f0e25678a25fc99775ceff25da56227fc7553c6f2f54587e28ef274e10f10048b194021494bea5673a764ef8db3215193

  • SSDEEP

    12288:6wWQaueH5qUhZXrkvoaY2CCuRnfyyc2oSSJRF5vnmlGNvuHk1Ctd37Duhy:6w6qUhEoTRVRfncHSqFJgGNPoz

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    nl10.nlkoddos.com
  • Port:
    587
  • Username:
    matto1@avindarou.net
  • Password:
    k[yH!8Z$AE;d
  • Email To:
    matto2@avindarou.net

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    nl10.nlkoddos.com
  • Port:
    587
  • Username:
    matto1@avindarou.net
  • Password:
    k[yH!8Z$AE;d

Targets

    • Target

      5f010877aa2a19af0395aa9faa351df8d2c13ab68b61063e34edfe17c2d75a0fexe.exe

    • Size

      638KB

    • MD5

      10477de164af2dd3f724c2ae1a24a98b

    • SHA1

      499746a12043721b7e08985087b54ee23f7f8903

    • SHA256

      5f010877aa2a19af0395aa9faa351df8d2c13ab68b61063e34edfe17c2d75a0f

    • SHA512

      1fb8a8a14f340103b9547ff65896b36f0e25678a25fc99775ceff25da56227fc7553c6f2f54587e28ef274e10f10048b194021494bea5673a764ef8db3215193

    • SSDEEP

      12288:6wWQaueH5qUhZXrkvoaY2CCuRnfyyc2oSSJRF5vnmlGNvuHk1Ctd37Duhy:6w6qUhEoTRVRfncHSqFJgGNPoz

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Collection

Data from Local System

2
T1005

Tasks