General

  • Target

    906cb4d1d82674ca8e0c0614d34af552.bin

  • Size

    764KB

  • Sample

    240422-b175nsea4z

  • MD5

    8d97409e9d0ffd8b9ca45a0e3e6d79d0

  • SHA1

    ad7d9c0e3ab119ed1d9124af5386ace48d2f4b3f

  • SHA256

    62c476d52ef1c34aa9035228f2c9a88d2a6256ee1c77c69789ac70b3c591fc7d

  • SHA512

    7dc40ee5f701e1f1a42b58fe0107e432122d77873c8cf7fe9f284b41f38cd611709acc3587723cc03b04660699abb9b7839c6e3f4bf7f5e67f7fc55d900255cf

  • SSDEEP

    12288:wLDMH139teOZlAQAc0lEI0qfpUuivem8abu8tMiaIuk2G+Nb7cn7sh:wXS70KslEGRUumSxq+1eQ

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.hoangtruongphat.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    hoangtruongphat818

Targets

    • Target

      6670de035561ab5f4cd82d89a4ab969b7d8eaf1da047782b37399d79eeb4762e.exe

    • Size

      784KB

    • MD5

      906cb4d1d82674ca8e0c0614d34af552

    • SHA1

      1c38bd8f3122bc9aaf7c2a8968c252ff2b264721

    • SHA256

      6670de035561ab5f4cd82d89a4ab969b7d8eaf1da047782b37399d79eeb4762e

    • SHA512

      6795637d769a1c0ef52a7e616b7f9f2310ec88889b8220a2d0268bed6a7b04ec0b5391355222b7ab0072c07e12edd2adcdcf8eeecd4a4029f5142fa3dffe7bc6

    • SSDEEP

      24576:xXYwIG7RaOvoOnAHRtZbsy1vBF1rG3AbHO7G:zIG7sOvoOnkFwoBLrG3AbHo

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks