General

  • Target

    bc419893a2948f85aa53af290eca67dc626ab1467b72a45419385d0fe709fd58

  • Size

    235KB

  • Sample

    231211-b6jn9shgcr

  • MD5

    7911215edc491695bf598dbff6f1d0c1

  • SHA1

    2eba02407a65333a3675b0bafda8ddd3f2f7fc99

  • SHA256

    bc419893a2948f85aa53af290eca67dc626ab1467b72a45419385d0fe709fd58

  • SHA512

    e0c8c566925d0fd15b105270ca2c6599597502df6876378e6f676cc4e0ee2d05c36ba73210412c7eaf7bb051051087867e7c6921ff88533b0e2a9a8a263426c6

  • SSDEEP

    6144:UR1ZlxGUdnFTKh6BbiYHXvf4Ax+C0c+g:UR1ZlxGUdnFKobf/jMX

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.elec-qatar.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    MHabrar2019@#

Targets

    • Target

      bc419893a2948f85aa53af290eca67dc626ab1467b72a45419385d0fe709fd58

    • Size

      235KB

    • MD5

      7911215edc491695bf598dbff6f1d0c1

    • SHA1

      2eba02407a65333a3675b0bafda8ddd3f2f7fc99

    • SHA256

      bc419893a2948f85aa53af290eca67dc626ab1467b72a45419385d0fe709fd58

    • SHA512

      e0c8c566925d0fd15b105270ca2c6599597502df6876378e6f676cc4e0ee2d05c36ba73210412c7eaf7bb051051087867e7c6921ff88533b0e2a9a8a263426c6

    • SSDEEP

      6144:UR1ZlxGUdnFTKh6BbiYHXvf4Ax+C0c+g:UR1ZlxGUdnFKobf/jMX

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks