General

  • Target

    6234259f72b83e53b94e1f502f2b6d392cb3652d7bcb0908235d3c7f2faca951

  • Size

    433KB

  • Sample

    240424-bprnjsde7s

  • MD5

    b14705de1ee244a7adfc5fca4aca36bf

  • SHA1

    3a9a95af7b1089e798a2dfe7b76e577a357b45a5

  • SHA256

    6234259f72b83e53b94e1f502f2b6d392cb3652d7bcb0908235d3c7f2faca951

  • SHA512

    762ed314e293a8d40a5596baafd693628a8209d9922bce68ed991886a8e0c1a10846758d56320f1a6904a3ab2c622682f82c7d19da22936c15653341a29deb60

  • SSDEEP

    12288:jZ7g+3lqGZ6hgC1jeeN1wN2t8Vk7mP5JgbDjamdLWQ:17g+30ngCBeecct8KBxWQ

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gfs-ld.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    @WlgG%V9

Targets

    • Target

      6234259f72b83e53b94e1f502f2b6d392cb3652d7bcb0908235d3c7f2faca951

    • Size

      433KB

    • MD5

      b14705de1ee244a7adfc5fca4aca36bf

    • SHA1

      3a9a95af7b1089e798a2dfe7b76e577a357b45a5

    • SHA256

      6234259f72b83e53b94e1f502f2b6d392cb3652d7bcb0908235d3c7f2faca951

    • SHA512

      762ed314e293a8d40a5596baafd693628a8209d9922bce68ed991886a8e0c1a10846758d56320f1a6904a3ab2c622682f82c7d19da22936c15653341a29deb60

    • SSDEEP

      12288:jZ7g+3lqGZ6hgC1jeeN1wN2t8Vk7mP5JgbDjamdLWQ:17g+30ngCBeecct8KBxWQ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks