General

  • Target

    3f1749a749e115f11409c9774c59804ed6f32a7d73b96ce8ea2c592dee4be079.exe

  • Size

    236KB

  • Sample

    240509-bs9njaaf8x

  • MD5

    9d60b328b960d55820217a37a5451fa3

  • SHA1

    200602658cdb35cfdf7fd259b685547de83ab765

  • SHA256

    3f1749a749e115f11409c9774c59804ed6f32a7d73b96ce8ea2c592dee4be079

  • SHA512

    e75df052474954e30b5ff18ef76d2ff01eb00eb6f6925386df22f2fb6784b8b184e72be6d54075d86ba8cebed05de1f0773207fc4e8f247cd70829cb7027ad20

  • SSDEEP

    3072:uNuNa7+7a5nrXj3evQH+F3JyPr8mmB+xAQaRT54Uk/XD2:uNuo7wa5nrXj3evQH+xJ9BkZaR/kr

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.metalsbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    zxcA@@258963

Targets

    • Target

      3f1749a749e115f11409c9774c59804ed6f32a7d73b96ce8ea2c592dee4be079.exe

    • Size

      236KB

    • MD5

      9d60b328b960d55820217a37a5451fa3

    • SHA1

      200602658cdb35cfdf7fd259b685547de83ab765

    • SHA256

      3f1749a749e115f11409c9774c59804ed6f32a7d73b96ce8ea2c592dee4be079

    • SHA512

      e75df052474954e30b5ff18ef76d2ff01eb00eb6f6925386df22f2fb6784b8b184e72be6d54075d86ba8cebed05de1f0773207fc4e8f247cd70829cb7027ad20

    • SSDEEP

      3072:uNuNa7+7a5nrXj3evQH+F3JyPr8mmB+xAQaRT54Uk/XD2:uNuo7wa5nrXj3evQH+xJ9BkZaR/kr

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks