General

  • Target

    Inquiry_4802BD_TX.exe

  • Size

    686KB

  • Sample

    240311-v4a4wsbe59

  • MD5

    6cc632d499306080e48f43f8f44b75e5

  • SHA1

    3604683683a8154183c99e9f487cef4206cb9d6e

  • SHA256

    ab5ee9cb5c02091cec9857e12e2ac854ea6dc1618a7a479ea4b7ebc12278c29d

  • SHA512

    5f284faa93361d783c6ab5e3929f355568ab9149b3cfab6dc325db47f8ec2921f473867684816b016186478e9c970a2a52b1042ca84baa916db8ff20939e8c2f

  • SSDEEP

    12288:cGX3inVFaVLC1TpeDdfYAJzgA0E45l7LCGcGncHHxm8ZbpMdITVRdeOVSct58Yuk:J32Him16dABfLrNFIJZGaTjdDVD6YuY7

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    zqamcx.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Methodman991

Targets

    • Target

      Inquiry_4802BD_TX.exe

    • Size

      686KB

    • MD5

      6cc632d499306080e48f43f8f44b75e5

    • SHA1

      3604683683a8154183c99e9f487cef4206cb9d6e

    • SHA256

      ab5ee9cb5c02091cec9857e12e2ac854ea6dc1618a7a479ea4b7ebc12278c29d

    • SHA512

      5f284faa93361d783c6ab5e3929f355568ab9149b3cfab6dc325db47f8ec2921f473867684816b016186478e9c970a2a52b1042ca84baa916db8ff20939e8c2f

    • SSDEEP

      12288:cGX3inVFaVLC1TpeDdfYAJzgA0E45l7LCGcGncHHxm8ZbpMdITVRdeOVSct58Yuk:J32Him16dABfLrNFIJZGaTjdDVD6YuY7

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks