General

  • Target

    a4ec5a5df2d564dd592f7d5f94de5c752b0bed56cdffed8af2719ff63c7db332

  • Size

    777KB

  • Sample

    240308-bytt9scf2v

  • MD5

    5072b45f4e46fd71a4ee787194b996cb

  • SHA1

    5b01b97f4f87e9e6556e6cd3960671dfa3cf4509

  • SHA256

    a4ec5a5df2d564dd592f7d5f94de5c752b0bed56cdffed8af2719ff63c7db332

  • SHA512

    7b5f24d28fbeed4eeed024cecc9d31032089bec278669927a7d7566b6b367cfe5d3212ca28556f87ee1208967a93696a780ce593f26ae89f1820e7138418366a

  • SSDEEP

    12288:8NVP2iNAOl4+LOcMOgb3ZJb9lAtOgGvo5qVb4gvY42O6v27cCaW/PbkR:8NR13ecMfXx4ee/UYril/P+

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    jCXzqcP1 daniel 3116

Targets

    • Target

      a4ec5a5df2d564dd592f7d5f94de5c752b0bed56cdffed8af2719ff63c7db332

    • Size

      777KB

    • MD5

      5072b45f4e46fd71a4ee787194b996cb

    • SHA1

      5b01b97f4f87e9e6556e6cd3960671dfa3cf4509

    • SHA256

      a4ec5a5df2d564dd592f7d5f94de5c752b0bed56cdffed8af2719ff63c7db332

    • SHA512

      7b5f24d28fbeed4eeed024cecc9d31032089bec278669927a7d7566b6b367cfe5d3212ca28556f87ee1208967a93696a780ce593f26ae89f1820e7138418366a

    • SSDEEP

      12288:8NVP2iNAOl4+LOcMOgb3ZJb9lAtOgGvo5qVb4gvY42O6v27cCaW/PbkR:8NR13ecMfXx4ee/UYril/P+

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks