General

  • Target

    473abc32162018e106a776dc9acceac0

  • Size

    840KB

  • Sample

    231226-a3fb1agfh6

  • MD5

    473abc32162018e106a776dc9acceac0

  • SHA1

    5152df8dbcec444f42ed278bc57fe47cfdb735b7

  • SHA256

    e64c0a4f990a69ed7b395ed86eb27f0334bc48a4cae437db54f3e7625392eaa9

  • SHA512

    e97e2acfbb92ae3f6966873dec23a02a483442177c2447d3f58a64e1af21e974999174a4d39b73313f86e1ea8d5af3f00dd466d00c42aa37f9e6c1e89558fd24

  • SSDEEP

    24576:YomEX4uYup9Ds//8o2HRwmHqvjR2ZwX7mo5oFCEkv:xmVME/b2xwmHmhosv

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.buynsell.com.pk
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Zeco@141

Targets

    • Target

      473abc32162018e106a776dc9acceac0

    • Size

      840KB

    • MD5

      473abc32162018e106a776dc9acceac0

    • SHA1

      5152df8dbcec444f42ed278bc57fe47cfdb735b7

    • SHA256

      e64c0a4f990a69ed7b395ed86eb27f0334bc48a4cae437db54f3e7625392eaa9

    • SHA512

      e97e2acfbb92ae3f6966873dec23a02a483442177c2447d3f58a64e1af21e974999174a4d39b73313f86e1ea8d5af3f00dd466d00c42aa37f9e6c1e89558fd24

    • SSDEEP

      24576:YomEX4uYup9Ds//8o2HRwmHqvjR2ZwX7mo5oFCEkv:xmVME/b2xwmHmhosv

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • CustAttr .NET packer

      Detects CustAttr .NET packer in memory.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks