General

  • Target

    Ödeme tavsiyesi.exe

  • Size

    763KB

  • Sample

    240504-jm4t4aff9x

  • MD5

    b3ddae5ff8449540f5fc5b1f60086569

  • SHA1

    74482462f1515682c136157de5a826081470f2e8

  • SHA256

    c1c17e6ce5d7105fa6f75ceb4672492e23fe35ea438dc9a26481d893be427789

  • SHA512

    91aaf115a40e44f8532fc6ce6bef8d86548eca4ea55be038a8480d3543e0d831133cbf57567f01af4464dbe87ad23703f920d1d1f5b54646c6f660027aaab8ea

  • SSDEEP

    12288:7dEgUeoUpPq3fX50ol/JB3HSDYK5qdE1aaYpT1QbZCm/tdwL11g3YG:mCXPqv64jCDYK5qdE1aaYpT1Qb0m/tU

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://eu-west-1.sftpcloud.io
  • Port:
    21
  • Username:
    6248aba3e30c4d5ca11aad04dd95e385
  • Password:
    DmEnBqH5w7NurkaD91VotzcZtKMTXKbe

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    eu-west-1.sftpcloud.io
  • Port:
    21
  • Username:
    6248aba3e30c4d5ca11aad04dd95e385
  • Password:
    DmEnBqH5w7NurkaD91VotzcZtKMTXKbe

Targets

    • Target

      Ödeme tavsiyesi.exe

    • Size

      763KB

    • MD5

      b3ddae5ff8449540f5fc5b1f60086569

    • SHA1

      74482462f1515682c136157de5a826081470f2e8

    • SHA256

      c1c17e6ce5d7105fa6f75ceb4672492e23fe35ea438dc9a26481d893be427789

    • SHA512

      91aaf115a40e44f8532fc6ce6bef8d86548eca4ea55be038a8480d3543e0d831133cbf57567f01af4464dbe87ad23703f920d1d1f5b54646c6f660027aaab8ea

    • SSDEEP

      12288:7dEgUeoUpPq3fX50ol/JB3HSDYK5qdE1aaYpT1QbZCm/tdwL11g3YG:mCXPqv64jCDYK5qdE1aaYpT1Qb0m/tU

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks