General

  • Target

    c86c9b4751f88f925a32ae8b399f2017

  • Size

    892KB

  • Sample

    240314-msn8dahh8z

  • MD5

    c86c9b4751f88f925a32ae8b399f2017

  • SHA1

    2481062c82c1eb0e9af9d126ff41f1594c0cf782

  • SHA256

    be725585e6ae2724abda2d338b40b4c39da0b712126da103408e4da844e1f6fa

  • SHA512

    fe1a6acd38111b7cb6d7ba45b060d40bdf499372f31522b3fe99d61a5edab818e5e1fde4151fd355f44c4f5568a2f78ca3edc4398a743d0e78026daa29527b39

  • SSDEEP

    24576:H+zMHNjjkvLGzIlDU/3P/cA4Rf8B3G1zn4:ezM0GIRUB3wz4

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Port:
    587
  • Username:
    yg�wt%�HIDHd�@CFHn�FE\s�Y^UK.�SP[
  • Password:
    9�TU������

Targets

    • Target

      Enq.xll

    • Size

      643KB

    • MD5

      0ed458621a0e75e9dac09b9cf00b909d

    • SHA1

      02f07b3badc63785cd66b181657322f851d3b0c2

    • SHA256

      7a6f8590d4be989faccb34cd393e713fd80fa17e92d7613f33061d647d0e6d12

    • SHA512

      2cb0a297922a609ccbebe3bd64ba8aa7560e2440753c0c39da545cb78248050d1bb0b98b92dd9e013ead850a7087882296bb464e7f639e8c5456b0955f9f9ac9

    • SSDEEP

      12288:pn/zDvGHAykHSzLW/4+8bzbBSreMdbhgFK/UqWgmrMqir:NzbGHAzHAjX1CcLgYi

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks