General

  • Target

    3681321143840CM.exe

  • Size

    667KB

  • Sample

    240522-gkl56aeb43

  • MD5

    0f10988a5146ac132e1bbc875b3cd3dd

  • SHA1

    a89fe9be43139dd986305da3876229ba2cbfb7bd

  • SHA256

    e4edb4a6d5718591e0fa02d78f3af9fe5cea87ed7f0e792fddc7022c6b5460c6

  • SHA512

    4282ff8b128270e68785514c5211bdf1aa8c7727c55d1aa5197e0635edbabf6c58fab6379f60d372bfef8f580de043b9e00803070d8dc48f0f9669479a697535

  • SSDEEP

    12288:BaIzwcGHWnqefhLXgeNyzd5PaAd6pk2nSLTTEj/2r6890DAkv2du:HzLxfhrgeNyZo3pLS34j06890DFOdu

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.saleo-gomel.by
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Q_gidroadmin_2014

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      3681321143840CM.exe

    • Size

      667KB

    • MD5

      0f10988a5146ac132e1bbc875b3cd3dd

    • SHA1

      a89fe9be43139dd986305da3876229ba2cbfb7bd

    • SHA256

      e4edb4a6d5718591e0fa02d78f3af9fe5cea87ed7f0e792fddc7022c6b5460c6

    • SHA512

      4282ff8b128270e68785514c5211bdf1aa8c7727c55d1aa5197e0635edbabf6c58fab6379f60d372bfef8f580de043b9e00803070d8dc48f0f9669479a697535

    • SSDEEP

      12288:BaIzwcGHWnqefhLXgeNyzd5PaAd6pk2nSLTTEj/2r6890DAkv2du:HzLxfhrgeNyZo3pLS34j06890DFOdu

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks