General

  • Target

    93485078ef40a7a7ffc90b2c787e52b3fb1e1df50504c513e3b238cdec8d93ef

  • Size

    637KB

  • Sample

    240417-rqr9gabg33

  • MD5

    077969f9680924a6a32271af886da970

  • SHA1

    d6550f05a8038c9bfef6bcc51a0f902c37871a1c

  • SHA256

    93485078ef40a7a7ffc90b2c787e52b3fb1e1df50504c513e3b238cdec8d93ef

  • SHA512

    e99cdfde75258f0f39fd3bf8c80176f5ba28453f05bf05b65b89da8b83b9ea3ef9a38af215f1ec8059392594e687eaca0f3f7a4301c4bc5d952e9aa83d235cf8

  • SSDEEP

    12288:AJ+XCDcvSOZIhOL95IPR7ITZy/P26zKTy2gQzkVqBbB7l5h5PJt7V9QUgQY5vgD:z9vSOGhOL9OPRUyPwIVqBb9l5Pnbm5gD

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.newstar-eg.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    passionofchrist123

Targets

    • Target

      a44cc5b971dcc6bb80c84e850b2529ef6f3e78cc24ce574ae3d2daacc8b9ea51.exe

    • Size

      662KB

    • MD5

      da5719cd690f52bd6ac6326605b0fccc

    • SHA1

      32a887dd95ee47ceb60710060416992859db380b

    • SHA256

      a44cc5b971dcc6bb80c84e850b2529ef6f3e78cc24ce574ae3d2daacc8b9ea51

    • SHA512

      88be2bf627f9706fbbd1c352ef681dbbaa6e56b6f841fb3d2b771eb269f4fcb0062e7f6905a298920df5256c27112d6549b438202e2fe0d7d20a367c19ea7079

    • SSDEEP

      12288:Wc/xeQ5vziw7D7yPIn7AqBmgIFqA6Uh7hOpzhHEgn0g3IUp004xWE:briID7ydq8gmqTIhOpFT0qbCC

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks