General

  • Target

    024 - PT MARGATEK_ SETYATAMA PO 13100976 _20.05.2024 %100%_jpg .exe

  • Size

    655KB

  • Sample

    240522-xczpaacd6z

  • MD5

    f02a932f414838b6ff71b051e3f976ff

  • SHA1

    5ffd3af5fac6b4049d02bb7d6d0c1a3b187edfc6

  • SHA256

    bbf3b7facc03ac358b1c43e2b1f5c35082958310a15d924415e5afd133d1ac0d

  • SHA512

    268a6c8a64199df170bc64e7fd7939108847721fa2c9cfd55304bd4fecce1109161b09048f167e9841362a0090051dc2cad08cd3656df7ae79376523fead85e3

  • SSDEEP

    12288:KgYzi8LkpEaEZhq2MJT4yKg41Kbh/V0b8HhlqJcK/C+XboT9Z6i0V7szA4:KR2jERhqNkyTAK9EMm/C+XboT9ZAx

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.adgumrukmusavirligi.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    GizCvk2019!.

Targets

    • Target

      024 - PT MARGATEK_ SETYATAMA PO 13100976 _20.05.2024 %100%_jpg .exe

    • Size

      655KB

    • MD5

      f02a932f414838b6ff71b051e3f976ff

    • SHA1

      5ffd3af5fac6b4049d02bb7d6d0c1a3b187edfc6

    • SHA256

      bbf3b7facc03ac358b1c43e2b1f5c35082958310a15d924415e5afd133d1ac0d

    • SHA512

      268a6c8a64199df170bc64e7fd7939108847721fa2c9cfd55304bd4fecce1109161b09048f167e9841362a0090051dc2cad08cd3656df7ae79376523fead85e3

    • SSDEEP

      12288:KgYzi8LkpEaEZhq2MJT4yKg41Kbh/V0b8HhlqJcK/C+XboT9Z6i0V7szA4:KR2jERhqNkyTAK9EMm/C+XboT9ZAx

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks