General

  • Target

    hesaphareketi_1.scr.exe

  • Size

    366KB

  • Sample

    240424-fej8yafb25

  • MD5

    39c348d66f448c5dfd2ce92756a2af10

  • SHA1

    0e236d48df2f56db7c292c402c48e098c5526639

  • SHA256

    3a9444944c737900563b16dab76e19bcd2c52f1d3b35e258d581b523586ae828

  • SHA512

    b01f7e6b47860f7687508f6fbd443923b5e782fb0d006eff78898b30610811442b41495183b2b8a48fc235175fc50b588f19f3e4176b8c9d91c1cc85d69dc68c

  • SSDEEP

    6144:JAHFQafd9O1S/jS4BwnvTB1QJgFmsDnv/snE2GUu6d7kxzjE2:+zd9OwGu+FmsDvQ9GHj

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    business29.web-hosting.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Esupofo234@

Targets

    • Target

      hesaphareketi_1.scr.exe

    • Size

      366KB

    • MD5

      39c348d66f448c5dfd2ce92756a2af10

    • SHA1

      0e236d48df2f56db7c292c402c48e098c5526639

    • SHA256

      3a9444944c737900563b16dab76e19bcd2c52f1d3b35e258d581b523586ae828

    • SHA512

      b01f7e6b47860f7687508f6fbd443923b5e782fb0d006eff78898b30610811442b41495183b2b8a48fc235175fc50b588f19f3e4176b8c9d91c1cc85d69dc68c

    • SSDEEP

      6144:JAHFQafd9O1S/jS4BwnvTB1QJgFmsDnv/snE2GUu6d7kxzjE2:+zd9OwGu+FmsDvQ9GHj

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks