General

  • Target

    6bcbf46ea9f61b2e443ae1b4d8b8e63e610fb894ee404694c166c96486735fa2

  • Size

    657KB

  • Sample

    240605-b9zjwsaf81

  • MD5

    b305cd91272473b55f47ce13eca2f049

  • SHA1

    dea9b56ab6ee5d31e35e62322273738ee1997166

  • SHA256

    6bcbf46ea9f61b2e443ae1b4d8b8e63e610fb894ee404694c166c96486735fa2

  • SHA512

    99def62c0e4fce5f133898c1cd8c63dee3cf223c832b44830d54ae745695ad36558cae8eff99a75981a5e75c2453e6bf63b034318b14097cff9d8350d01fdec2

  • SSDEEP

    12288:j+3yvK/gEOcG4sKbZTckii5Ni5wHT+Haqv3Tuyk8:AytxKbfieNlHT5CCy

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.farm-valley.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Businessvalley@2020

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      6bcbf46ea9f61b2e443ae1b4d8b8e63e610fb894ee404694c166c96486735fa2

    • Size

      657KB

    • MD5

      b305cd91272473b55f47ce13eca2f049

    • SHA1

      dea9b56ab6ee5d31e35e62322273738ee1997166

    • SHA256

      6bcbf46ea9f61b2e443ae1b4d8b8e63e610fb894ee404694c166c96486735fa2

    • SHA512

      99def62c0e4fce5f133898c1cd8c63dee3cf223c832b44830d54ae745695ad36558cae8eff99a75981a5e75c2453e6bf63b034318b14097cff9d8350d01fdec2

    • SSDEEP

      12288:j+3yvK/gEOcG4sKbZTckii5Ni5wHT+Haqv3Tuyk8:AytxKbfieNlHT5CCy

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks