General

  • Target

    Pro-Forma Invoice ( SO2324I9405).exe

  • Size

    234KB

  • Sample

    240108-wpy3vaeghj

  • MD5

    30a0948bd1acab57b4b132365fa9e01d

  • SHA1

    0d996a2b5c4bb3364c58343350f98ea421265604

  • SHA256

    e21cbcbb1005efb933b99b1e09a12c333b1fadc391ebde3e1261b83559082455

  • SHA512

    894d6e2753c1e7a2d5e1c4c23ee225ac7d84331f8cdd542f362af1c5fc39268cd79d2feba1d08f9a4b7dd71707640d4cbd4c5462145b0841b5da966ebdee9f44

  • SSDEEP

    3072:000klR1ZljJlD8jjfCbl12bipf0byv55crKBY:000klR1ZlllD8jjfCbBpf0bykre

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.ahlada.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    21rY$9U}48j]

Targets

    • Target

      Pro-Forma Invoice ( SO2324I9405).exe

    • Size

      234KB

    • MD5

      30a0948bd1acab57b4b132365fa9e01d

    • SHA1

      0d996a2b5c4bb3364c58343350f98ea421265604

    • SHA256

      e21cbcbb1005efb933b99b1e09a12c333b1fadc391ebde3e1261b83559082455

    • SHA512

      894d6e2753c1e7a2d5e1c4c23ee225ac7d84331f8cdd542f362af1c5fc39268cd79d2feba1d08f9a4b7dd71707640d4cbd4c5462145b0841b5da966ebdee9f44

    • SSDEEP

      3072:000klR1ZljJlD8jjfCbl12bipf0byv55crKBY:000klR1ZlllD8jjfCbBpf0bykre

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks