General

  • Target

    be906e39d3e1241a47ebedcdf3d9037e

  • Size

    962KB

  • Sample

    240310-n8ybnacf2t

  • MD5

    be906e39d3e1241a47ebedcdf3d9037e

  • SHA1

    130b129121d70a912529e34dae9fe5c0d2d8e1b8

  • SHA256

    738e1faa6295bbc4e85f7fdec90b9ec22c95dd77662bcfc37e273e8e47119be3

  • SHA512

    a8140041b4ce674c46273b40cf7691dbbe3db8783c72b52a017d9c123c4150adf4b9784cbf6696bf6ea5ffce51011c871d2e6022c602c2f6e493b52b3cd79614

  • SSDEEP

    12288:XXUe0b97TgzWoL3s0GMhnRS2DSgn24SwyaUVKnpwwV4pKNageIc2ijm3j2xsunn4:XXUeK0zWK3s0VnRS2xaahpx

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.logoffices.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    M%X71?1SiKj^

Targets

    • Target

      be906e39d3e1241a47ebedcdf3d9037e

    • Size

      962KB

    • MD5

      be906e39d3e1241a47ebedcdf3d9037e

    • SHA1

      130b129121d70a912529e34dae9fe5c0d2d8e1b8

    • SHA256

      738e1faa6295bbc4e85f7fdec90b9ec22c95dd77662bcfc37e273e8e47119be3

    • SHA512

      a8140041b4ce674c46273b40cf7691dbbe3db8783c72b52a017d9c123c4150adf4b9784cbf6696bf6ea5ffce51011c871d2e6022c602c2f6e493b52b3cd79614

    • SSDEEP

      12288:XXUe0b97TgzWoL3s0GMhnRS2DSgn24SwyaUVKnpwwV4pKNageIc2ijm3j2xsunn4:XXUeK0zWK3s0VnRS2xaahpx

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks