General

  • Target

    164841a083b4f39cef5e2d36ee3a9f4b7c1b915f9e3a9198d1e4e40e5f77fa18.exe

  • Size

    1.2MB

  • Sample

    240522-bjqjasfg4s

  • MD5

    38b40ed92252dde605b71b5b7c2d20a0

  • SHA1

    fa584ece47b918be06cb023b98d29711fb4f7c56

  • SHA256

    164841a083b4f39cef5e2d36ee3a9f4b7c1b915f9e3a9198d1e4e40e5f77fa18

  • SHA512

    9a3615eff6a44626ef9e5301e2719935519a8dbc45c773c9eeb2b71cfc047c61bc8a34ff2225a9bb646bf8489b5e98ecad00878846a1ccb3b07a802e4e44be5f

  • SSDEEP

    24576:C+LAcHzC+wPmDvH4RPBPD1cjXc9IIEbCv3zH6s5K4Z3LB0Wve3agJToFtmZCQ/nL:XGcyEb4mM3LykgJkFYZCm5

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.visiontrade.ae
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ,,.Ishaq2021 ,,

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      164841a083b4f39cef5e2d36ee3a9f4b7c1b915f9e3a9198d1e4e40e5f77fa18.exe

    • Size

      1.2MB

    • MD5

      38b40ed92252dde605b71b5b7c2d20a0

    • SHA1

      fa584ece47b918be06cb023b98d29711fb4f7c56

    • SHA256

      164841a083b4f39cef5e2d36ee3a9f4b7c1b915f9e3a9198d1e4e40e5f77fa18

    • SHA512

      9a3615eff6a44626ef9e5301e2719935519a8dbc45c773c9eeb2b71cfc047c61bc8a34ff2225a9bb646bf8489b5e98ecad00878846a1ccb3b07a802e4e44be5f

    • SSDEEP

      24576:C+LAcHzC+wPmDvH4RPBPD1cjXc9IIEbCv3zH6s5K4Z3LB0Wve3agJToFtmZCQ/nL:XGcyEb4mM3LykgJkFYZCm5

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables packed with or use KoiVM

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks