General

  • Target

    3ae260f1e9c2d6c04ada45a0056d2d76

  • Size

    693KB

  • Sample

    231231-ydmxjsfea9

  • MD5

    3ae260f1e9c2d6c04ada45a0056d2d76

  • SHA1

    d0e9bb72aebb1064b49f8510ca4b63f84b239ac8

  • SHA256

    688d70d9269a53533a36941546e2f0e08e5be3344bea2ccfe19693d8b7cf4e13

  • SHA512

    2d18b070fab407d8436e0343228e25d832fac77e20804be1018426364f6d428c8f0763c276c695f46068306478f22340416cdf9bdc6a31874caa85ff3bd9fd08

  • SSDEEP

    12288:GeZhvdRVz7LtGa+ErXQhHrn2yjkhJh4tKp6eP93:GKEajrXQhLn2yjBfe

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.vivaldi.net
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Facebook123.

Targets

    • Target

      3ae260f1e9c2d6c04ada45a0056d2d76

    • Size

      693KB

    • MD5

      3ae260f1e9c2d6c04ada45a0056d2d76

    • SHA1

      d0e9bb72aebb1064b49f8510ca4b63f84b239ac8

    • SHA256

      688d70d9269a53533a36941546e2f0e08e5be3344bea2ccfe19693d8b7cf4e13

    • SHA512

      2d18b070fab407d8436e0343228e25d832fac77e20804be1018426364f6d428c8f0763c276c695f46068306478f22340416cdf9bdc6a31874caa85ff3bd9fd08

    • SSDEEP

      12288:GeZhvdRVz7LtGa+ErXQhHrn2yjkhJh4tKp6eP93:GKEajrXQhLn2yjBfe

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks