General

  • Target

    45ead9ca274b18b987506c5b62b21ad4.unknown

  • Size

    2.3MB

  • Sample

    240106-l49g1sdbgr

  • MD5

    45ead9ca274b18b987506c5b62b21ad4

  • SHA1

    65562400b81491ddf832794c3c2ffb8b78977bb4

  • SHA256

    f936f3df58fe783f2b89a3e836e77727399c86fce62541e46ece8ad3039645b8

  • SHA512

    1ba05f3fb36a0b3cccbf9b0088331e96655610f0ba70784a9d0fc0469ad5f209b66198cc4407e772a30c737528b1249f0eaf2c49ad0adc5ce0af8b2e543595e0

  • SSDEEP

    24576:NQElKJE5AMeTEzW61eV3RGg80SsD8AxAH2AAPAlAAAAvAxAAA2mAAlAAAYAIAA5A:NQSq2JK6KV80SsD3

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    serv-10708.handsonwebhosting.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    icui4cu2@@

Targets

    • Target

      comprobante.pdf.exe

    • Size

      1.1MB

    • MD5

      36caa90ad7983f4d019e45ffe4563f96

    • SHA1

      375af942d0e826b9bdd8213284790f3f88695f6e

    • SHA256

      460466b4bd3a9389f45e255c2dc48bc49f59cea7ed45f10f1b052442bb8e8175

    • SHA512

      ffd0924b4eebb237f25a7421f7f33176a96d51371b710e169255553691efda93648b535b68d273fe83a43364b33d575bc3af789de0db6aa80d72ebe4d6f1febc

    • SSDEEP

      12288:cne8ES7hCJH213UvLYu6fMxnbsEBEXPCtnJUcVpt34gv0ZGmgkddP63FRPRVmn:IEzJ64k9ExbsEBE6tJUcVpt34I01gkd

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Drops file in Drivers directory

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks