General

  • Target

    d951562a841f3706005d7696052d45397e3b4296d4cd96bf187920175fbb1676

  • Size

    264KB

  • Sample

    240105-brgw5agbf9

  • MD5

    1c469a1700ae8103f6305dfa99edfac4

  • SHA1

    409527d7dcae8e4f10cc46082d14dd023bb95eaf

  • SHA256

    d951562a841f3706005d7696052d45397e3b4296d4cd96bf187920175fbb1676

  • SHA512

    30bfae181d81ef4f3da7b6440d3eb8228c091a13d9fe0d9550890d357341ae10eda6c27b9516799b80b360b80b6025c678ac8a5d63469608590c9918542f2c2a

  • SSDEEP

    6144:bIEZkYaTgA4AIt+uLy2IKGMiTtSFYtjQ:rZkYaTgA47+uLy28MiTto

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.ronaldsmith.loan
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    BillionPay$

Targets

    • Target

      d951562a841f3706005d7696052d45397e3b4296d4cd96bf187920175fbb1676

    • Size

      264KB

    • MD5

      1c469a1700ae8103f6305dfa99edfac4

    • SHA1

      409527d7dcae8e4f10cc46082d14dd023bb95eaf

    • SHA256

      d951562a841f3706005d7696052d45397e3b4296d4cd96bf187920175fbb1676

    • SHA512

      30bfae181d81ef4f3da7b6440d3eb8228c091a13d9fe0d9550890d357341ae10eda6c27b9516799b80b360b80b6025c678ac8a5d63469608590c9918542f2c2a

    • SSDEEP

      6144:bIEZkYaTgA4AIt+uLy2IKGMiTtSFYtjQ:rZkYaTgA47+uLy28MiTto

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks