General

  • Target

    ef9f1f860b713188f4622d6223f3fe90c804d4b4707eab79a7b22403b63f062b.zip

  • Size

    661KB

  • Sample

    240221-ewbsfsbh55

  • MD5

    2afa37440793c40811a963eb6b45e270

  • SHA1

    62a7177dcb32ef83e7ee9530cf83f5098932fc97

  • SHA256

    ef9f1f860b713188f4622d6223f3fe90c804d4b4707eab79a7b22403b63f062b

  • SHA512

    cfe5be24ba680ad0cb51aefd62d834406f188714efb0f7cdb310f75c5585ad67d0b0c87c4217fb706c121a62619821a85a2a4285b74673768be331405035cd94

  • SSDEEP

    12288:YphEHz8cc+klL3lTGjbjnfZipa6wFFoNwu97PfJokNWRMCZ:Yp6O+kF3lTGjb7BipQF+dfJ3HA

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.seawaysfreight-bd.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    04@AjG%sFl#

Targets

    • Target

      SOA JAN 2024.exe

    • Size

      690KB

    • MD5

      79c8f05b3c7ff420dc57d120cc916064

    • SHA1

      00d55766f5b7b93b3751b37a2acc1bb0c959e6b2

    • SHA256

      8785f6e6f1278ba50e518c72e2e41a91b98f3e1b0e3b66723f6ee3166c4d4743

    • SHA512

      9dec51f76bfea7b8d59430ddd9acc24b1aac4c1c11aa0049b40e6a6c2c0136fad3fbc4c3246c047e9241d9515728e32498372dc244036e6bcc02872be7b0ad28

    • SSDEEP

      12288:pSmPwRYnOELz89/O+kXLntXnKbNtfZapa6OpJoLYu97l3JoQMmB:pSmP0Y74/O+k7nt3Kb/BapMJaz3JNMc

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks