General

  • Target

    c7abec7766ae833d5ee6011ee05179aae5930424ae870d0995b48f12c956852a

  • Size

    616KB

  • Sample

    240529-b8hjzsdf2v

  • MD5

    868c9a9d3f3a2aac454ed1b78129acba

  • SHA1

    43ebb354ad9e1ba6f4b5541857d8c221aabf259c

  • SHA256

    c7abec7766ae833d5ee6011ee05179aae5930424ae870d0995b48f12c956852a

  • SHA512

    2e925b0f316ae97bff1c9dd31380ba4539771cc9465fa16f4f6cb1db39f42019e492a1e68cf86195b02f1219f12a015b422e3f01c166705c7ae5207cfb567666

  • SSDEEP

    12288:sGocBkJ8uBBlhrOWu+ih3pk2aJLhEvV4lnjpgds0H5LFJa:3op8urlNOWuhh3S2ajMMnjpgdsgxJa

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.asplparts.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    CPMWkhyu7=b8

Targets

    • Target

      shipping information.exe

    • Size

      632KB

    • MD5

      4ec4c75000926de4b30a57b971b1fd9a

    • SHA1

      53b88b8f13d354e1fbdb1fb96cc600e1f5db6077

    • SHA256

      0e4eab3e8d91e2c3097b28f55b5e0d6531e671bb5933c186cc5de11e72e67f74

    • SHA512

      2343a5e1cbe8b762008904dbdb0b5afeeda33c0b8b318b4156bca7332e04150cbdc27bb1ada169993217bc330bdb8db9977f7d84fc1906fb5fa38c08c73428e1

    • SSDEEP

      12288:AhYSgu/UtgCpJ8hsrqgu+iJ3pG2upLdinV4lFFNOdEgHzh8h:7S9UtBpJ8hYqguhJ3A2uzcMFFNOdEO8

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks