General

  • Target

    #568350035791.exe

  • Size

    770KB

  • Sample

    240416-py86vaae88

  • MD5

    63afe391178cb8bf14d24d2d569dbc51

  • SHA1

    477c0cea3777ec0e4e98eba78dd81b72f12af8f4

  • SHA256

    2fa2f6f81dc805b509157ff73570ef9fd921cc0b73bece828000356c926546a6

  • SHA512

    0beea59ffb0e56eb7c926cb125944c43d753788cce9a0b0ff43e78c14e689c330349e372f28df0366e52af044c397335f8889f755e59c0a7380496009ccbec6b

  • SSDEEP

    12288:Wp2IEA/HPL374emD+biF/cQ5zLYsC+1BViX1j4bSVlxVlIi014bFZsyWFcw:OPDdmDZ/cQ91pBViFjXlN9FZsy6cw

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.techwiser.in
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    tech@#$121

Targets

    • Target

      #568350035791.exe

    • Size

      770KB

    • MD5

      63afe391178cb8bf14d24d2d569dbc51

    • SHA1

      477c0cea3777ec0e4e98eba78dd81b72f12af8f4

    • SHA256

      2fa2f6f81dc805b509157ff73570ef9fd921cc0b73bece828000356c926546a6

    • SHA512

      0beea59ffb0e56eb7c926cb125944c43d753788cce9a0b0ff43e78c14e689c330349e372f28df0366e52af044c397335f8889f755e59c0a7380496009ccbec6b

    • SSDEEP

      12288:Wp2IEA/HPL374emD+biF/cQ5zLYsC+1BViX1j4bSVlxVlIi014bFZsyWFcw:OPDdmDZ/cQ91pBViFjXlN9FZsy6cw

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks