General

  • Target

    0ccc712d46bb00f467bccc08c6d60537a890e4f37369ac8315e850bedba7f69a.exe

  • Size

    757KB

  • Sample

    240409-bednyacg8s

  • MD5

    c626054ea75c76e90aca83d4e8581aa7

  • SHA1

    5f771a063fc3c0961097eea2d2d4e111b0eb4b84

  • SHA256

    0ccc712d46bb00f467bccc08c6d60537a890e4f37369ac8315e850bedba7f69a

  • SHA512

    24b381ad80a1974a4d2c56d29ef867c4b865302a3b842c437144fabbb713ac92d0d8c6b7f73ed578ca6cdc18fa28184d4c913a90d557616836b32ab495114645

  • SSDEEP

    12288:5B1oVeonikbljz5HHVG1oVjWraYiLkTbHiZKR3ZLGISU4DY2MQYZHbv9+kR:xo5ikblPp1mQjW5TbCoR3VGIZ4Dzm7vz

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    nl9.nlkoddos.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Myname321@

Targets

    • Target

      0ccc712d46bb00f467bccc08c6d60537a890e4f37369ac8315e850bedba7f69a.exe

    • Size

      757KB

    • MD5

      c626054ea75c76e90aca83d4e8581aa7

    • SHA1

      5f771a063fc3c0961097eea2d2d4e111b0eb4b84

    • SHA256

      0ccc712d46bb00f467bccc08c6d60537a890e4f37369ac8315e850bedba7f69a

    • SHA512

      24b381ad80a1974a4d2c56d29ef867c4b865302a3b842c437144fabbb713ac92d0d8c6b7f73ed578ca6cdc18fa28184d4c913a90d557616836b32ab495114645

    • SSDEEP

      12288:5B1oVeonikbljz5HHVG1oVjWraYiLkTbHiZKR3ZLGISU4DY2MQYZHbv9+kR:xo5ikblPp1mQjW5TbCoR3VGIZ4Dzm7vz

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion

    • Detects executables packed with SmartAssembly

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks