General

  • Target

    104398948d38b5b4edcf8f84d941a9e171df7208cf81e80195ee64c91801cc26

  • Size

    709KB

  • Sample

    240307-b8xnxaea61

  • MD5

    3ed561debb7b5503e23a931208091f08

  • SHA1

    b1531e0d5486742702d16dcf553eea875e2d9a4c

  • SHA256

    104398948d38b5b4edcf8f84d941a9e171df7208cf81e80195ee64c91801cc26

  • SHA512

    18983e5e1bf0bf73cb9f59decf4c3028b4d1147eb26143a18cd28996856767a5d229ed50ff10dcba853c94899c05ddab481ce6767f34b3ce8574d391138038e4

  • SSDEEP

    12288:tBtuk7/jvPsv5iHI0GJKIUi942GQFAsvJGouGARLUlumb2lCcp7jizCDstRd:sc/jvP6wHIn4WFtIopARyb2kc7ji+sf

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    pro51.emailserver.vn
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    O{AG(tbFk2.Y

Targets

    • Target

      104398948d38b5b4edcf8f84d941a9e171df7208cf81e80195ee64c91801cc26

    • Size

      709KB

    • MD5

      3ed561debb7b5503e23a931208091f08

    • SHA1

      b1531e0d5486742702d16dcf553eea875e2d9a4c

    • SHA256

      104398948d38b5b4edcf8f84d941a9e171df7208cf81e80195ee64c91801cc26

    • SHA512

      18983e5e1bf0bf73cb9f59decf4c3028b4d1147eb26143a18cd28996856767a5d229ed50ff10dcba853c94899c05ddab481ce6767f34b3ce8574d391138038e4

    • SSDEEP

      12288:tBtuk7/jvPsv5iHI0GJKIUi942GQFAsvJGouGARLUlumb2lCcp7jizCDstRd:sc/jvP6wHIn4WFtIopARyb2kc7ji+sf

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks