General

  • Target

    16024396335.zip

  • Size

    269KB

  • Sample

    240315-lzqt4sff88

  • MD5

    93ae26b5d0dfaf2b73404e7e0421280a

  • SHA1

    b7e482ad7d42f5827729d25f35ad3aea1e505bc3

  • SHA256

    ebb087cd8eda272ea47f667d231e6d3ac97b76d089916dbe881a1cf5b50791d6

  • SHA512

    cae043fbc4a09f129153f297d34091d597d42f352c08018e2a560b3d30f851f87b05dc06ff7cc5811763d6efc92fc1f6bcd719aafbadb2715b51cfca45ffb829

  • SSDEEP

    6144:B//XS+1MaEoVo9h7DAiNhlqnRpBgeH6uk5wuE6iQou2FhrPqZiEOUT:1anhNlNhlqR6xRWQou2repXT

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.fis-uae.com.ng
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Big2024maxxymaxx2024

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      d57d6ee71d3e0a161bdadd309300d5e7d1129af61886889a8b197addea8617a7

    • Size

      291KB

    • MD5

      d26ec10d5be6b25f879fc0c9f91d65b5

    • SHA1

      230049e849f93203c35f581e662181cf583379fe

    • SHA256

      d57d6ee71d3e0a161bdadd309300d5e7d1129af61886889a8b197addea8617a7

    • SHA512

      6522638195072c233468f12ff32753ae9737a919b7d90f131c5d2063ee74273c489c77190a733d69670edad72a7fc1195c01915cbc7d43374452cf40df684a36

    • SSDEEP

      6144:fuTFsSgr/bMXZbqx2ulmOgyeNuw3VXgF6kXRYncUg+4SnbF4:mThGbMX9W2ulmOIZg6kBQESnC

    Score
    5/10
    • Drops file in System32 directory

    • Target

      FILE072024.exe

    • Size

      340KB

    • MD5

      b9f9bcdea392c69e0ae52b21249ebae7

    • SHA1

      e53b2226e99553057457c0cbb00a6228e47239fb

    • SHA256

      db8e59274891184242f029e9db38f965c7aebcc50c65d6899568a48c36098166

    • SHA512

      3ff8ae35e966a1ba2eec719983f80ed067c6e242fe12e12b04b087fec91c3631af77015632c4411ba106832ef9101654247062a0be603d9f70905c40c1295ecd

    • SSDEEP

      6144:gOXzo08c9RvPIYz/7bPYTUcw4dg0UZ6dLeqWoG2JK1rSZTRJ8zQdS+WO28:PoaRvh7+Ucw42fZ6dCDzgEyRJsR+i8

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks