General

  • Target

    1e882445077d58c8ef385bb1faa91c928aa50603ec8b7a3699b715c88afbc6b0

  • Size

    6.1MB

  • Sample

    240619-cz3n8swgnq

  • MD5

    8cad137c6ace7d6636718746ed206d0a

  • SHA1

    b71904af73638afda4b64c9ea6868c0cba673d13

  • SHA256

    1e882445077d58c8ef385bb1faa91c928aa50603ec8b7a3699b715c88afbc6b0

  • SHA512

    2f3bc42c5513e3415563e6d54ae2ee9298e2670fbfd1141adcff7006cf0aeb33312033229e917520290c65dc1687f50b78e5609c5f8b726a909f2870a40fba1e

  • SSDEEP

    24576:z9aTZ7PhY/cLtXreQZRAYuo+o8TqlE3lktwDaB0IVYqjzZNGuYkEWcG9e8P9ty7U:S7PhY/2SonO1iwWESGuYkn

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.confidencegroup.co
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    egITwZxo6+06

Targets

    • Target

      P.Order-076476476.exe

    • Size

      6.0MB

    • MD5

      c39c44bf34ace8be66d0a732e462f81a

    • SHA1

      3bf278359db19cb1e71b54b6f3c111044387b844

    • SHA256

      7170d54327613cb15b03425df3ddca43055f7ba40366eb67e1643fd306074c77

    • SHA512

      5821d106bc6728dd417f7e9608928caba4b553db5f1f9553ba18e86597c9567e7d6d102161afa2258df3fd302da4b24d402dac3b773a955e3c4fcb2af1888b4c

    • SSDEEP

      24576:V9aTZ7PhY/cLtXreQZRAYuo+o8TqlE3lktwDaB0IVYqjzZNGuYkEWcG9e8P9ty7U:47PhY/2SonO1iwWESGuYkn

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks