General

  • Target

    cb557806ca3ca62cd48626ff2df456d6.bin

  • Size

    631KB

  • Sample

    240405-b5drmagh2y

  • MD5

    edb931ea8f171c0fe48c005dbae64910

  • SHA1

    4aa2f3451bab5a4200877132882fefda7cb3eae6

  • SHA256

    498c1ac03e5d48a0dd1360e9cbf58840281f41d04dceaf9f703b016a497a06bb

  • SHA512

    6436ff20180dda85c1553b47a4a6d80358b48290fa378f83cbba1be87fb131c2f04547a77053d186dfce2208a4bf56322a8b5260d317b4aa6076b4f66749cc27

  • SSDEEP

    12288:VGAmYTgN2Uk7hWZW/jgeRDmy0fD6LNUVZSs5kF8CezvqP+l8EA0RuMP2P49P8Skz:rTgIUk7jbge9+PYs5kFyzvK+ySu02Qju

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.italiacanda-it.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    d$)vyCW7

Targets

    • Target

      65592ca7266175aad70994b48f085c1d00b2fe4d49d64b22a4c6e6d70c33c594.exe

    • Size

      683KB

    • MD5

      cb557806ca3ca62cd48626ff2df456d6

    • SHA1

      3ddcc386c5d453f2605b037676a2c667fbcafde1

    • SHA256

      65592ca7266175aad70994b48f085c1d00b2fe4d49d64b22a4c6e6d70c33c594

    • SHA512

      aa5b8675547f77f0659026034eacbd36bf50b3ab68ce536738b852c0abafa6d80a186a76c29210e171eb8fff7d8b6feb75d68cacddf7394cb8bc4837ee155bac

    • SSDEEP

      12288:ZIZcb4SXi5BTPFj2ZBAJ0IRSX0mkPAY7Ru1xvlEIGx6lZ0DhzM5vrSFzKnO:KdSXeZaB805X09I1xutx6lGDhM5vrSFz

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks