General

  • Target

    NEW PO10124.exe

  • Size

    690KB

  • Sample

    240515-kjp27shd99

  • MD5

    ef33c35be9b375935186e69866e52739

  • SHA1

    a960303e27edecdb25a32af0051f8a1b5c8c47df

  • SHA256

    77ca4ee4e11265fae0cb39bd6ebbaca1e771411098fdd5c11a4ad6eb73b1a85c

  • SHA512

    96ddc46e1dba575e457ac8524a83560146ef6902a6e6ffb8b812b0a8dd0e027c56ae775523091c8db04a31fd1119e33e2a293a14380a063cfd44c3304c15fd81

  • SSDEEP

    12288:5fJP21680skSKSIwCvJPFUuK6tTWTRWKmMf8PrdDMxSECstg34nf+H78DySuqMEN:j+1680JSNIHHw6taTwtPRMxdf+bGRMEN

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.policymartinsurance.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Kwal4952@

Targets

    • Target

      NEW PO10124.exe

    • Size

      690KB

    • MD5

      ef33c35be9b375935186e69866e52739

    • SHA1

      a960303e27edecdb25a32af0051f8a1b5c8c47df

    • SHA256

      77ca4ee4e11265fae0cb39bd6ebbaca1e771411098fdd5c11a4ad6eb73b1a85c

    • SHA512

      96ddc46e1dba575e457ac8524a83560146ef6902a6e6ffb8b812b0a8dd0e027c56ae775523091c8db04a31fd1119e33e2a293a14380a063cfd44c3304c15fd81

    • SSDEEP

      12288:5fJP21680skSKSIwCvJPFUuK6tTWTRWKmMf8PrdDMxSECstg34nf+H78DySuqMEN:j+1680JSNIHHw6taTwtPRMxdf+bGRMEN

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks