General

  • Target

    d18832b11f1888ec1f1fdf42593eb69e8b9e9a3a0d2962075457342c6ddc43d3

  • Size

    245KB

  • Sample

    240419-chcrgsdf86

  • MD5

    42a3234af2a19a557aa050711a4d852c

  • SHA1

    ef97f1ba216e2b2453c744f7eb4fa6f8b7ccc714

  • SHA256

    d18832b11f1888ec1f1fdf42593eb69e8b9e9a3a0d2962075457342c6ddc43d3

  • SHA512

    7d68562fcaa99b937adbc823a9f4d9eb13e5b86cddd05b1b00e19a74e65dcdec199e4a60028aee242292feca7cf430639d63bfb3e621c0dc8f73f5235850e620

  • SSDEEP

    3072:ydvgYNJedyYwg4oO2Fwtc6asg1ExkMw6r4k5uwFRLsB:ydvHEdyYwg4oO2Fwtc6aNd042FF

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.jdeihe.ac.ir
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    9132849230vjB@

Targets

    • Target

      d18832b11f1888ec1f1fdf42593eb69e8b9e9a3a0d2962075457342c6ddc43d3

    • Size

      245KB

    • MD5

      42a3234af2a19a557aa050711a4d852c

    • SHA1

      ef97f1ba216e2b2453c744f7eb4fa6f8b7ccc714

    • SHA256

      d18832b11f1888ec1f1fdf42593eb69e8b9e9a3a0d2962075457342c6ddc43d3

    • SHA512

      7d68562fcaa99b937adbc823a9f4d9eb13e5b86cddd05b1b00e19a74e65dcdec199e4a60028aee242292feca7cf430639d63bfb3e621c0dc8f73f5235850e620

    • SSDEEP

      3072:ydvgYNJedyYwg4oO2Fwtc6asg1ExkMw6r4k5uwFRLsB:ydvHEdyYwg4oO2Fwtc6aNd042FF

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks