General

  • Target

    02052024_0745_02052024_SOA for MAR to APR 2024.rar

  • Size

    617KB

  • Sample

    240502-jltmqscf2x

  • MD5

    85933b78cc63a566e69db80cc1a80f27

  • SHA1

    6c6b768f63c62a95739f1d69cf67d23db6e24015

  • SHA256

    e3b2e76724874ce8fb9ca418642da65498eec471db9d03bdc282c0a3ee9fee53

  • SHA512

    04b159e3197ed2654f108e288324b43e96c7df25c7c2a0588fb47fa7d8f54b1827e67adc472c86ba97fbcbe3421fb76304fe081e517845b81851f58902e5ea71

  • SSDEEP

    12288:eY2b3U43t5HocTdMCY/HSZTkxVQCPQUJgn081ncE4ozlCh0CJES6TaEdi2/E/8nz:Z2DU43b7d0iwhoU80ynLZCh7ETjjn6W

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.sibasultrasonics.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    wxQ@kr-2OL,{

Targets

    • Target

      SOA for MAR to APR 2024.exe

    • Size

      642KB

    • MD5

      5289d2c93cce286dae9043ead72e7b02

    • SHA1

      5c13dfc669950864e54dc138a9e451cce81a1f2a

    • SHA256

      2110414c768dfdd7d71319fcacf0e3f9b5e98b80700e53bd0a38a00a21c2ca98

    • SHA512

      5f15eacc2fc9a2ef3b6346ed133d9dea630799d9120ff80da105db6ab9f72e38992326be713e4eb8a6dc1279fe58643eba68ef2bb386a17316e968ab23bdf3ff

    • SSDEEP

      12288:Z4l/BcB588ebZPEFwxf7YECW06uvjXUSeBcwp87rnUuykR:Z4lpc0X2eTtovvoowp8c+

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks