General

  • Target

    5a7d4c9d192a61051ed40b239e3d66c4

  • Size

    922KB

  • Sample

    240114-gyy2waecf3

  • MD5

    5a7d4c9d192a61051ed40b239e3d66c4

  • SHA1

    e76c75cf784089c3590969539afc0dfc89a8271f

  • SHA256

    0a2d2b015b51c82e1d3861387ef2b7656193bd223411579ae7bc9e6b272b44d4

  • SHA512

    1389d92cf189b89fde35e0bdf75482be6e811ccd822c45cb2697624b511d2d50de9ea1ddaeb91c91f867abae96b4021881ab847aedc242071396b35124e90a0e

  • SSDEEP

    24576:4ORcwS/d3FtAK7OfIaPN/udPzk+j33IBK:jRc0K7OAe2dPgsY

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.cpagrenada.org
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Accounts2017@CPA

Targets

    • Target

      5a7d4c9d192a61051ed40b239e3d66c4

    • Size

      922KB

    • MD5

      5a7d4c9d192a61051ed40b239e3d66c4

    • SHA1

      e76c75cf784089c3590969539afc0dfc89a8271f

    • SHA256

      0a2d2b015b51c82e1d3861387ef2b7656193bd223411579ae7bc9e6b272b44d4

    • SHA512

      1389d92cf189b89fde35e0bdf75482be6e811ccd822c45cb2697624b511d2d50de9ea1ddaeb91c91f867abae96b4021881ab847aedc242071396b35124e90a0e

    • SSDEEP

      24576:4ORcwS/d3FtAK7OfIaPN/udPzk+j33IBK:jRc0K7OAe2dPgsY

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • CustAttr .NET packer

      Detects CustAttr .NET packer in memory.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks