General

  • Target

    ca9ce774706c2f1708af10d3da19be03

  • Size

    635KB

  • Sample

    240315-gba2jahc41

  • MD5

    ca9ce774706c2f1708af10d3da19be03

  • SHA1

    059fc99b8d6ff50f997d7acb1a0ccf55cc776605

  • SHA256

    4f4b3dded538765e48f27d8bf0ef605572313a3f95f71f642daa53402abd8776

  • SHA512

    b351dbb0eae5871f7996a46d004862c824fdc6f23bfb06cff6b55f3662fc453e890e5af94c0b02cbf513228be27e39a5f13ccade69b5bd3de4149af1f34ed760

  • SSDEEP

    12288:DeMOEti1x8SlqOs9XU09GD4jPFAxfdd+12aXVnt:DGEtoll7uGDuwdUl

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://universalinks.net/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    {lafa{u^wEx8

Targets

    • Target

      ca9ce774706c2f1708af10d3da19be03

    • Size

      635KB

    • MD5

      ca9ce774706c2f1708af10d3da19be03

    • SHA1

      059fc99b8d6ff50f997d7acb1a0ccf55cc776605

    • SHA256

      4f4b3dded538765e48f27d8bf0ef605572313a3f95f71f642daa53402abd8776

    • SHA512

      b351dbb0eae5871f7996a46d004862c824fdc6f23bfb06cff6b55f3662fc453e890e5af94c0b02cbf513228be27e39a5f13ccade69b5bd3de4149af1f34ed760

    • SSDEEP

      12288:DeMOEti1x8SlqOs9XU09GD4jPFAxfdd+12aXVnt:DGEtoll7uGDuwdUl

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Drops file in Drivers directory

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks