General

  • Target

    a68a4bc1f558e8297566af69b8258b2d6596a0f2762e95c963d71f5cd327eb02.exe

  • Size

    917KB

  • Sample

    240701-pll6jsvdnm

  • MD5

    d299f9454bbcd4f38b61cce01fd4c7ea

  • SHA1

    e469c6c3e0e83a235ae5795e5d84f484bb82e0ca

  • SHA256

    a68a4bc1f558e8297566af69b8258b2d6596a0f2762e95c963d71f5cd327eb02

  • SHA512

    1a7254f5ceabd0c18dfa197134b527b8969ae4af1aa4b6fc82e2ae147dc185b5dcf71fa5afe1d8f3a43d3edec785ebcb4b0ae2caa839b63db5f4c5500da132e4

  • SSDEEP

    24576:BsViyyKIAHDPKMtGKXLEdqbzghPQP+0Norxvl:aVihKIkDX3AEbaQP+0Norxd

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Dxld$dH2

Targets

    • Target

      a68a4bc1f558e8297566af69b8258b2d6596a0f2762e95c963d71f5cd327eb02.exe

    • Size

      917KB

    • MD5

      d299f9454bbcd4f38b61cce01fd4c7ea

    • SHA1

      e469c6c3e0e83a235ae5795e5d84f484bb82e0ca

    • SHA256

      a68a4bc1f558e8297566af69b8258b2d6596a0f2762e95c963d71f5cd327eb02

    • SHA512

      1a7254f5ceabd0c18dfa197134b527b8969ae4af1aa4b6fc82e2ae147dc185b5dcf71fa5afe1d8f3a43d3edec785ebcb4b0ae2caa839b63db5f4c5500da132e4

    • SSDEEP

      24576:BsViyyKIAHDPKMtGKXLEdqbzghPQP+0Norxvl:aVihKIkDX3AEbaQP+0Norxd

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks