General

  • Target

    17ebaf866f5bec6d103149f0d03d022181988f0eb7bd3737de97c91a30c53a33.exe

  • Size

    634KB

  • Sample

    240212-czhztsgg8t

  • MD5

    a2744a18a34724215d4a3e0274203dd4

  • SHA1

    29a9af6a60bf90d7d2334a39432eca096b8472d2

  • SHA256

    17ebaf866f5bec6d103149f0d03d022181988f0eb7bd3737de97c91a30c53a33

  • SHA512

    adc7b8aa9993717ae84e13c37f057f33ac7f3098f372e9f1de74dbc11bd34593cc83ad44f0ae4b29a8d7db5e9e8d3d23898c999be176585b9e24dac3063ee925

  • SSDEEP

    12288:MZ5+xEd60NfydfCy9px+3IH6ggI7qiir4rbSqAPsTEUz3O2JN+Exo5yP7vnOmgSH:EcxcNEdfC+YYHXgI740rbSqpTDz/OEi

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.dmsinnovative.ro
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Haftasar23

Targets

    • Target

      17ebaf866f5bec6d103149f0d03d022181988f0eb7bd3737de97c91a30c53a33.exe

    • Size

      634KB

    • MD5

      a2744a18a34724215d4a3e0274203dd4

    • SHA1

      29a9af6a60bf90d7d2334a39432eca096b8472d2

    • SHA256

      17ebaf866f5bec6d103149f0d03d022181988f0eb7bd3737de97c91a30c53a33

    • SHA512

      adc7b8aa9993717ae84e13c37f057f33ac7f3098f372e9f1de74dbc11bd34593cc83ad44f0ae4b29a8d7db5e9e8d3d23898c999be176585b9e24dac3063ee925

    • SSDEEP

      12288:MZ5+xEd60NfydfCy9px+3IH6ggI7qiir4rbSqAPsTEUz3O2JN+Exo5yP7vnOmgSH:EcxcNEdfC+YYHXgI740rbSqpTDz/OEi

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks