General

  • Target

    69f065a7b13b8067d3eaa613180a3ba2fb2f03c658b6f398209024700d288bf3

  • Size

    693KB

  • Sample

    240514-jetddsfc7z

  • MD5

    96cb932974b4d07cf7d11caef8c1d590

  • SHA1

    d75be7456230cf9f0db6e2f8589c11f87918de88

  • SHA256

    69f065a7b13b8067d3eaa613180a3ba2fb2f03c658b6f398209024700d288bf3

  • SHA512

    c60cccf9eba48dad4563e48ba6017aa3bb5411aecfef413ea74b7cce443e646d26309a93234357a20d85887866de3bc7d07c95e7c1c3be6e1594329c9c0e351f

  • SSDEEP

    12288:a5F6HkkoFOuwMx7Qzb9y91thseOFseQoCe1Kls65wf/gLYN+kn:a+Y7QlKhCiet1KS60D

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.magnaprocessing.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Hookit6278

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      69f065a7b13b8067d3eaa613180a3ba2fb2f03c658b6f398209024700d288bf3

    • Size

      693KB

    • MD5

      96cb932974b4d07cf7d11caef8c1d590

    • SHA1

      d75be7456230cf9f0db6e2f8589c11f87918de88

    • SHA256

      69f065a7b13b8067d3eaa613180a3ba2fb2f03c658b6f398209024700d288bf3

    • SHA512

      c60cccf9eba48dad4563e48ba6017aa3bb5411aecfef413ea74b7cce443e646d26309a93234357a20d85887866de3bc7d07c95e7c1c3be6e1594329c9c0e351f

    • SSDEEP

      12288:a5F6HkkoFOuwMx7Qzb9y91thseOFseQoCe1Kls65wf/gLYN+kn:a+Y7QlKhCiet1KS60D

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks