General

  • Target

    Proforma Invoice 3315.rar

  • Size

    77KB

  • Sample

    240109-th18hsdgam

  • MD5

    74248b7097167d20260d2bd11bb0a87d

  • SHA1

    865ab3dedaff835a35bd53afce393f27a182dd7d

  • SHA256

    307d8e98ffc2485375b8c09646aaa2371f989f667ef58b126caa43a2d98f9e9e

  • SHA512

    426ff3eef88d9ceeb49747673d3c73822bcbca767f1cd98494b834606a2eed3bf506663b49d21f816419bdc40fbadc83dc70cbbd47ab7d608d01b653b6d9de25

  • SSDEEP

    1536:mB/gg8qoZ9z/bsvzi/b75ythbXs2wLvbspuD4M6QxmEq//yv0PgGYjAR:mVg/qwjbUiz7oP7hwLvbBkQxmx/K8PnZ

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.ahlada.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    21rY$9U}48j]

Targets

    • Target

      Proforma Invoice 3315.exe

    • Size

      234KB

    • MD5

      30a0948bd1acab57b4b132365fa9e01d

    • SHA1

      0d996a2b5c4bb3364c58343350f98ea421265604

    • SHA256

      e21cbcbb1005efb933b99b1e09a12c333b1fadc391ebde3e1261b83559082455

    • SHA512

      894d6e2753c1e7a2d5e1c4c23ee225ac7d84331f8cdd542f362af1c5fc39268cd79d2feba1d08f9a4b7dd71707640d4cbd4c5462145b0841b5da966ebdee9f44

    • SSDEEP

      3072:000klR1ZljJlD8jjfCbl12bipf0byv55crKBY:000klR1ZlllD8jjfCbBpf0bykre

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks