General

  • Target

    7aa3f456550482e7bda6a02528ac9810

  • Size

    651KB

  • Sample

    240127-s7rjyahaak

  • MD5

    7aa3f456550482e7bda6a02528ac9810

  • SHA1

    1abd3b6a868e4af96fdecea6d24d18c504cd53e8

  • SHA256

    4257668544f82471d6be72eca158de2d80011072ba2954b06fbae4ff6a71b4d2

  • SHA512

    47a21e70c4346f4518aa976870bad9f63044b11b8cdc792740399415ea76e099b2692c10dbcfd4d95da222b58945fc7c897301d789154b82d68041cf33e018f1

  • SSDEEP

    12288:IeZh0joFiZfb46r1z9FNWQF0kNNDWciU0:I7o+TdfbWQykNO

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.onurtriko.com.tr
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Ee980502+E

Targets

    • Target

      7aa3f456550482e7bda6a02528ac9810

    • Size

      651KB

    • MD5

      7aa3f456550482e7bda6a02528ac9810

    • SHA1

      1abd3b6a868e4af96fdecea6d24d18c504cd53e8

    • SHA256

      4257668544f82471d6be72eca158de2d80011072ba2954b06fbae4ff6a71b4d2

    • SHA512

      47a21e70c4346f4518aa976870bad9f63044b11b8cdc792740399415ea76e099b2692c10dbcfd4d95da222b58945fc7c897301d789154b82d68041cf33e018f1

    • SSDEEP

      12288:IeZh0joFiZfb46r1z9FNWQF0kNNDWciU0:I7o+TdfbWQykNO

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks