General

  • Target

    8899b61107f515054d03b1c459b88bfe7a9f3f453dc4a99f9c8f65cb94e7d2c1

  • Size

    621KB

  • Sample

    240315-b4k5bade3x

  • MD5

    7789472c47878afcfbc8605830599037

  • SHA1

    92b7ec56729bbbaa663e743c4aaa68347a784c21

  • SHA256

    8899b61107f515054d03b1c459b88bfe7a9f3f453dc4a99f9c8f65cb94e7d2c1

  • SHA512

    ea3db8ec210298de7b11685b5e8548cb3ba9546ab83bab18b72fce2bae5cc55007921389457798bc93cd24d651ab82c6be16beeba24d35496be663468bd7bfe2

  • SSDEEP

    12288:7MSivC8dHzx35MV68J0wi+mVpPGt/DTkt9fxuCpF6FhUU3+:4e835ODq+mVpPk3kt97gFhM

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.2sautomobile.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Kenzi051008

Targets

    • Target

      SHIPPING ADVICE.exe

    • Size

      683KB

    • MD5

      ee5bee47041dc2d9885ad611cac68297

    • SHA1

      e38755842137b383c30d438bffbca752791a1704

    • SHA256

      55571fa3b9f2d9a7d71c1154aac73dc3826860eaa7be12cceda40d4566ea4ce1

    • SHA512

      7a7a42485ff96a350476f05a03e367677b9e01e952a1790c3797faa149a11394de50bd98d40ccd41304dc56ad634c98f50dd6c831ab93943582a9038f91ee9cd

    • SSDEEP

      12288:4MohCfCUzvNxN5Af6kpmaimmVhgz00+FDrbk39eh9znhmQVN7zE:qUaU95ad0mmVh1zhHk39enzhmQVNz

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks