General

  • Target

    5b0b5154cfa07104cd8b66125de0a8a027cc34fc8f9f5be253585eaf5b4222f5.exe

  • Size

    1.3MB

  • Sample

    240522-b26y1agc52

  • MD5

    8cfaea18edcfaa6d07b767f536dd49b8

  • SHA1

    fb5c9207fe390526d2c7a1a4602cb13e9947400c

  • SHA256

    5b0b5154cfa07104cd8b66125de0a8a027cc34fc8f9f5be253585eaf5b4222f5

  • SHA512

    769d7732517188ab5ed93c5d091ff9be85e16a1f9a36e4cbb67f05e8d6e733d8723f487496c5d405ac6f19cad8737b72d54dae83c6764e944ee435562f98bc9e

  • SSDEEP

    24576:Mk3r2BvMMMU/tHSk4RaH6s5KvgpLOfi0uOULYxp9v+ocVhOvrgXRwzxam:7y9Mj9opLGiJYxvv+omh6gXR+4m

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.svetigeorgije.co.rs
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    4c5H&b2whkD9

Targets

    • Target

      5b0b5154cfa07104cd8b66125de0a8a027cc34fc8f9f5be253585eaf5b4222f5.exe

    • Size

      1.3MB

    • MD5

      8cfaea18edcfaa6d07b767f536dd49b8

    • SHA1

      fb5c9207fe390526d2c7a1a4602cb13e9947400c

    • SHA256

      5b0b5154cfa07104cd8b66125de0a8a027cc34fc8f9f5be253585eaf5b4222f5

    • SHA512

      769d7732517188ab5ed93c5d091ff9be85e16a1f9a36e4cbb67f05e8d6e733d8723f487496c5d405ac6f19cad8737b72d54dae83c6764e944ee435562f98bc9e

    • SSDEEP

      24576:Mk3r2BvMMMU/tHSk4RaH6s5KvgpLOfi0uOULYxp9v+ocVhOvrgXRwzxam:7y9Mj9opLGiJYxvv+omh6gXR+4m

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects executables packed with or use KoiVM

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

4
T1552

Credentials In Files

3
T1552.001

Credentials in Registry

1
T1552.002

Collection

Data from Local System

4
T1005

Email Collection

1
T1114

Tasks