General

  • Target

    154c5d86522ffd7a1cd03d23b3b19ee5.bin

  • Size

    143KB

  • Sample

    240327-bkrgzsgf89

  • MD5

    70250e6b31ae996ce3ae2055c45738bb

  • SHA1

    5b1673ffcf3db54ffdaac918c501d2e23c2bea3f

  • SHA256

    2a2f86509bacd2fb5f9e972c1f77295d98ac4a620f1ae415a26b9fbc2da964da

  • SHA512

    4dc52f0b1741b6ff5f3420fb70f0f4486285de16d4fc5e7c11456682e72884e095f1cbdadcae2838dc1fc1221b3bf9065e1b85de23b267040489c55e1174905a

  • SSDEEP

    3072:8gumT85TGzfo1tIBGfPXju/zYOiE6njoxAf+tFNj8pNbO+AQBMj3VDO:8gfwFGDEIAy/bInvf+Vj8pN0QBYBO

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.bfm.com.mk
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Sonja1234@@4321

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      b3f2c0468d40628a6fa17d8dfaca76b89525063c9f1c3b337f9929311e4d7cfe.vbs

    • Size

      196KB

    • MD5

      154c5d86522ffd7a1cd03d23b3b19ee5

    • SHA1

      41743b862c01c4c8eef124a85560657f58a0a575

    • SHA256

      b3f2c0468d40628a6fa17d8dfaca76b89525063c9f1c3b337f9929311e4d7cfe

    • SHA512

      0179e5323e21f3f34dbbe5ed2930ca25fa8158db15824adae867e9cf74df1a642516aa86910676c06a3f39fe9a7f7296f8f5fa70e7a23b4227535bd0b525a760

    • SSDEEP

      3072:k+az7K1R0Qnfs+7d7mz6WK5jiAQeQ/fCdkoLTIXlcoutMAp5Fvk2:SCXkKIeWK5jFw3CGc9tXp5Fvk2

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks