General

  • Target

    211640b6b1e1023f75fccc8feca3dbc886ed51dd9cd7582f656231bdf6f4917c

  • Size

    656KB

  • Sample

    240307-b8gmpaea6y

  • MD5

    973cf039a45a5132634e89940d9a9369

  • SHA1

    d220d9385099edd230748f8a3373544696908bf9

  • SHA256

    211640b6b1e1023f75fccc8feca3dbc886ed51dd9cd7582f656231bdf6f4917c

  • SHA512

    6d0928a2ec7d288b75c9632fe00c2c6d42df158b5dbabbad4d7f54adab263befa2596fa56810900ed27226fbc2621c9710a47e1007e305bcba752761337abe2e

  • SSDEEP

    12288:V9pbohlKu904kS6obyDDE4Dt3pFeylmFCIw0krgT9+bn6IOsWjkG0aTvOv3GiXZ9:DpO/9Woig4Dt3pFcCIIExV3sKRy3GiXD

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.zqamcx.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Anambraeast@123

Targets

    • Target

      EKSTRE.exe

    • Size

      743KB

    • MD5

      0e1667b99c63fe9538224c067cc27e14

    • SHA1

      63222f5bc43dbc5b8bcf5eaba253ab2db3601b0f

    • SHA256

      aa0bb57cc545a3e7e234ef691f84ea8f2fc90f4e024a3addcc23d2f20a0e63e0

    • SHA512

      a7776aa20b7581666bc49ffb168cb17b588c7833b07b3e011e250e87241deefa5bc87c91e528d03213358af48110e87dd890d2f908d86979be3dd9be3f485743

    • SSDEEP

      12288:sBtg6Z/jRu90UkSmo8ZgcfNI5LX+39uE0krgTT+bZQK3EP9dgNkR:JQ/jE9wojcfNIgNZEvE8ldJ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks