General

  • Target

    032b6917cc18691519b11513f5baf18b.bin

  • Size

    625KB

  • Sample

    240410-bcnfcsbb99

  • MD5

    f3ee632102dd418ac42536909266b3a3

  • SHA1

    4916214c6c902b8bd1975f9812a716944d52db58

  • SHA256

    7eef2a174f94a9ae6f6e28ebdadc9e39eeff6fc4c4bd366232685f72b1ba20d9

  • SHA512

    dc6bd59275a36f4aa65e779497af48dbd21dc3f2d98a85e597c62ac252577452d895719fbe24c8618e9231cf523a1bfdf0b6f515908e5a6bd2704028d655a93c

  • SSDEEP

    12288:+vlpmzfJG98E07tQBt9etdSei4nRUYYmPywoSS3GrCSYaJNGcpG:+OTJwoI9etdSeHRUqKwo+Clc0

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.karapipe.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    elu8wTHZY5

Targets

    • Target

      86ea784bb86a20eff340835a0cf862d6a4a5b2309ead2c00006b65c2d8f5ebd1.exe

    • Size

      696KB

    • MD5

      032b6917cc18691519b11513f5baf18b

    • SHA1

      625a7f22299f5764804c54e35dd99b4848a9d747

    • SHA256

      86ea784bb86a20eff340835a0cf862d6a4a5b2309ead2c00006b65c2d8f5ebd1

    • SHA512

      943b0130a528362d6ba175ad0a765ce22049590a9d5d430a20907b5e5e8756735bbcfde2f1809041a92aae93535c9f3e370e7aad15da6bd7afa28b12324e5e6a

    • SSDEEP

      12288:NiShCo4DqWlx5u5FQ6pKXf+f2iNHdCG4Wo1yyepUuO+6HK:gSUFkpp9qWo18pqvq

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks