General

  • Target

    ASMT-AR00-AST00 1980pcs.exe

  • Size

    1002KB

  • Sample

    240606-jldxaabe2t

  • MD5

    059ee108e42cddef53d61ff14780d8aa

  • SHA1

    3ba3366f05dfa32d91ef17532e59387f69ebd897

  • SHA256

    1f7dcd5994d22e9acfb0313d58b4227abcd33966ae38863d91fbed5a0cd7b415

  • SHA512

    203201e22c82da17e0c5e7823d86c4fe3f2e9949a76bbfde2999a94b688b59be58e01ba22fc71d6b777ecd68e8ddfaf34f7144ea75697de0166d63bf55a9fc49

  • SSDEEP

    24576:K47C3c6Tjz9TiaNviiD8e94QnqcoMH3V5K0BRngtY+VTzCl:Kc6jtPviiDrOQ3Hl5K0LgtY+VTzo

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.medicalhome.com.pe
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    MHinfo01

Targets

    • Target

      ASMT-AR00-AST00 1980pcs.exe

    • Size

      1002KB

    • MD5

      059ee108e42cddef53d61ff14780d8aa

    • SHA1

      3ba3366f05dfa32d91ef17532e59387f69ebd897

    • SHA256

      1f7dcd5994d22e9acfb0313d58b4227abcd33966ae38863d91fbed5a0cd7b415

    • SHA512

      203201e22c82da17e0c5e7823d86c4fe3f2e9949a76bbfde2999a94b688b59be58e01ba22fc71d6b777ecd68e8ddfaf34f7144ea75697de0166d63bf55a9fc49

    • SSDEEP

      24576:K47C3c6Tjz9TiaNviiD8e94QnqcoMH3V5K0BRngtY+VTzCl:Kc6jtPviiDrOQ3Hl5K0LgtY+VTzo

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks