General

  • Target

    94095bca33da33ad83f7b8d55b150cc79f646625002aeb595524c7defe2707c7.exe

  • Size

    656KB

  • Sample

    240328-cx9d1aah26

  • MD5

    67ba70657c56f2c7b9e41cd29dfe8420

  • SHA1

    f95dc5a17d2316d638f413f68049bdc6e9869c6b

  • SHA256

    94095bca33da33ad83f7b8d55b150cc79f646625002aeb595524c7defe2707c7

  • SHA512

    490a806cd3cef05f0d758b68d662cac9ab551d839cfef0a1a7c713b3e1b7017f9873cdd7118daa6a1052c40c9c2e9c81be5fff5e22dee8e7a042d47386423f68

  • SSDEEP

    12288:psHzOUNUSB/o5LsI1uwajJ5yvv1l25jfB7/+bj74WbZzS4fk/cP4l0dfuPTT:QiUmSB/o5d1ubcvIWbnHZexUmf

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.fosna.net
  • Port:
    587
  • Username:
    goldwisejewelsowerri@fosna.net
  • Password:
    jF&ZPSBJ*@6T

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.fosna.net
  • Port:
    587
  • Username:
    goldwisejewelsowerri@fosna.net
  • Password:
    jF&ZPSBJ*@6T
  • Email To:
    resultboxgoldwize@fosna.net

Targets

    • Target

      94095bca33da33ad83f7b8d55b150cc79f646625002aeb595524c7defe2707c7.exe

    • Size

      656KB

    • MD5

      67ba70657c56f2c7b9e41cd29dfe8420

    • SHA1

      f95dc5a17d2316d638f413f68049bdc6e9869c6b

    • SHA256

      94095bca33da33ad83f7b8d55b150cc79f646625002aeb595524c7defe2707c7

    • SHA512

      490a806cd3cef05f0d758b68d662cac9ab551d839cfef0a1a7c713b3e1b7017f9873cdd7118daa6a1052c40c9c2e9c81be5fff5e22dee8e7a042d47386423f68

    • SSDEEP

      12288:psHzOUNUSB/o5LsI1uwajJ5yvv1l25jfB7/+bj74WbZzS4fk/cP4l0dfuPTT:QiUmSB/o5d1ubcvIWbnHZexUmf

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • UPX dump on OEP (original entry point)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks