General

  • Target

    e12160051d05c920fe17a344ede8466f785b82603ebeb4071fbad0ce2b8f3296

  • Size

    649KB

  • Sample

    231208-c2b93aab2s

  • MD5

    ad5bb07ce43df4278b18681fc5aa47b4

  • SHA1

    a0ef56d019bb8bda3e3063eea3b2a530cc5c379a

  • SHA256

    e12160051d05c920fe17a344ede8466f785b82603ebeb4071fbad0ce2b8f3296

  • SHA512

    7b574e9b35a2253cf83428e605ac35f550fb3c8302ce68d3c1abc36be96535591d6c585a4f84f0e232a8fa4e2eed0e70233a3e5b69f6266da8d11cccd39be5b6

  • SSDEEP

    12288:MxgQaueH5qeqNEL5Uu0J11En6gx00aKNEf3Cx/5QXToEyo8QtJ9WpxIzW:MxkqeqRppgradf3CxSToEtdtzqx2

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.turathmall-ksa.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Julliannah123

Targets

    • Target

      e12160051d05c920fe17a344ede8466f785b82603ebeb4071fbad0ce2b8f3296

    • Size

      649KB

    • MD5

      ad5bb07ce43df4278b18681fc5aa47b4

    • SHA1

      a0ef56d019bb8bda3e3063eea3b2a530cc5c379a

    • SHA256

      e12160051d05c920fe17a344ede8466f785b82603ebeb4071fbad0ce2b8f3296

    • SHA512

      7b574e9b35a2253cf83428e605ac35f550fb3c8302ce68d3c1abc36be96535591d6c585a4f84f0e232a8fa4e2eed0e70233a3e5b69f6266da8d11cccd39be5b6

    • SSDEEP

      12288:MxgQaueH5qeqNEL5Uu0J11En6gx00aKNEf3Cx/5QXToEyo8QtJ9WpxIzW:MxkqeqRppgradf3CxSToEtdtzqx2

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks