General

  • Target

    1.exe

  • Size

    1.1MB

  • Sample

    240315-she5lsde93

  • MD5

    5eb4967e6ed05f848693ce7fde83763f

  • SHA1

    afa7cb665a898a75cf8e2b85f1ae5203f6fca9dd

  • SHA256

    e401fde43737a4e212e861ef0f8bb56e6c7a67553c3988b9216d77e3edf3c26c

  • SHA512

    06f0b5bd341cf217ded0a9b18c8de03ce3c5aff90c590d047b4cd4b562f67edeae3d025b6af462800dc38cd85ca6891e8903cc5cbab4fc287a39e73e3720c83f

  • SSDEEP

    24576:0qMiTL7KVQ69SiXH9OpIJQY7MjgWzrt5hWZr++BAQ6:0qnTL7uQ69SiXHXqY7MEWzfsZr+CAJ

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.karapipe.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    elu8wTHZY5

Targets

    • Target

      1.exe

    • Size

      1.1MB

    • MD5

      5eb4967e6ed05f848693ce7fde83763f

    • SHA1

      afa7cb665a898a75cf8e2b85f1ae5203f6fca9dd

    • SHA256

      e401fde43737a4e212e861ef0f8bb56e6c7a67553c3988b9216d77e3edf3c26c

    • SHA512

      06f0b5bd341cf217ded0a9b18c8de03ce3c5aff90c590d047b4cd4b562f67edeae3d025b6af462800dc38cd85ca6891e8903cc5cbab4fc287a39e73e3720c83f

    • SSDEEP

      24576:0qMiTL7KVQ69SiXH9OpIJQY7MjgWzrt5hWZr++BAQ6:0qnTL7uQ69SiXHXqY7MEWzfsZr+CAJ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks