General

  • Target

    db20519924e99ae33ab901c6abcb38ddb3eb8602129046c7dbc9c888b5ed6f83

  • Size

    234KB

  • Sample

    240606-c289sseh81

  • MD5

    f042414d3d6ac2434d8a2fbc2047be90

  • SHA1

    bf7bebf1985f5a70ca141905c58a72496fcf0629

  • SHA256

    db20519924e99ae33ab901c6abcb38ddb3eb8602129046c7dbc9c888b5ed6f83

  • SHA512

    9e2d14b2a926814612e24c7da616fb06fee050e4a8c415d92f268db725ea40e0ebd3b4974be84f7250638d09e3c792135cd56a41c5f08c740b0984ff5500b7f9

  • SSDEEP

    3072:MLr6mlI84UopFfn4bQe/JsjOpI5x/QPwEd8:MLrvI84UopFfn4bQfOpK/Sw0

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.avasanat.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    dHGYMrbBo6

Targets

    • Target

      db20519924e99ae33ab901c6abcb38ddb3eb8602129046c7dbc9c888b5ed6f83

    • Size

      234KB

    • MD5

      f042414d3d6ac2434d8a2fbc2047be90

    • SHA1

      bf7bebf1985f5a70ca141905c58a72496fcf0629

    • SHA256

      db20519924e99ae33ab901c6abcb38ddb3eb8602129046c7dbc9c888b5ed6f83

    • SHA512

      9e2d14b2a926814612e24c7da616fb06fee050e4a8c415d92f268db725ea40e0ebd3b4974be84f7250638d09e3c792135cd56a41c5f08c740b0984ff5500b7f9

    • SSDEEP

      3072:MLr6mlI84UopFfn4bQe/JsjOpI5x/QPwEd8:MLrvI84UopFfn4bQfOpK/Sw0

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks