General

  • Target

    2004-6-0x00000000004C0000-0x0000000000502000-memory.dmp

  • Size

    264KB

  • Sample

    240124-bynm9afabk

  • MD5

    77f830cd19dc0ca7b339fdb6a2c11f9c

  • SHA1

    954020e45fa419a4ac3cf8143ad9d3e3aec6344d

  • SHA256

    8e02524d2aab1a9470b4365642cb95b8bd8b3697f0c2750aaa66a65560dc89e2

  • SHA512

    bcdeec9b8c53bb01dda9c89aae3706bf830cf16c4130e1d29e7f3f82649c84c7df1cec07b03ed221c4183d51436fc04f21aeaf0663683fd1a942bd65982945a7

  • SSDEEP

    3072:EOG8UksMDVr4PfnftAkRvDdm0AnzDwuTX5g65zUu+PQ:Eb8UksMRr4PfnakRvDd9uTR5QuR

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    svnh oeyt maai vbsz

Targets

    • Target

      2004-6-0x00000000004C0000-0x0000000000502000-memory.dmp

    • Size

      264KB

    • MD5

      77f830cd19dc0ca7b339fdb6a2c11f9c

    • SHA1

      954020e45fa419a4ac3cf8143ad9d3e3aec6344d

    • SHA256

      8e02524d2aab1a9470b4365642cb95b8bd8b3697f0c2750aaa66a65560dc89e2

    • SHA512

      bcdeec9b8c53bb01dda9c89aae3706bf830cf16c4130e1d29e7f3f82649c84c7df1cec07b03ed221c4183d51436fc04f21aeaf0663683fd1a942bd65982945a7

    • SSDEEP

      3072:EOG8UksMDVr4PfnftAkRvDdm0AnzDwuTX5g65zUu+PQ:Eb8UksMRr4PfnakRvDd9uTR5QuR

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks