General

  • Target

    7ccbf5f74be56cd5921069366e3e6e7e8fdd06c7e0630de19e505d70e82edc7f

  • Size

    663KB

  • Sample

    240228-bgskwaff6w

  • MD5

    28249a4c777daf16ea664d3dde2bfe6a

  • SHA1

    8dad752b503cf9efa75cc6bbedfb9cca98716709

  • SHA256

    7ccbf5f74be56cd5921069366e3e6e7e8fdd06c7e0630de19e505d70e82edc7f

  • SHA512

    dc4d4e83a4fe99a31cf01bce8c2008125696b63a3e124e5495578dab094bd82b01fd4ba5dc96a2473b74f1f1a037f113a204e8f05901cd4bb21a63a3f0b02630

  • SSDEEP

    12288:jxo0HZt48qCf7XnFFqd0v5JAnyNr/YFhTtrlpEeGZqgmFUiHBR:ja0Hv48rrFsdSAnyNr/OBpwaR

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.childs-plays.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    yuttrge7v

Targets

    • Target

      DHL9407155789.exe

    • Size

      790KB

    • MD5

      0cc7ea8604079f77c76b13049c47f22a

    • SHA1

      c30e82a0f13f57ae766633a1fe7221e60db4d19e

    • SHA256

      9344791020d84c327e17e94aaabcec10a2c37199484b05429493236fda65df01

    • SHA512

      f47057fc67e12faace21b5aa5bbf6df960ef97bb1459232ad014cb4f587376c88dbf1961d81941af9b48df6c0b5a097ad48e500c5fce5e4e798264cd02d7feca

    • SSDEEP

      12288:ma1ScVYsq0fJPnFPq9qvZJMpyNTBOFHq9abIPBrlpEyKP4biOR/:TSOYs/5Fi9OMpyNTBPw+BpkCiA/

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks