General

  • Target

    906c1863777e91ff508ccb1758ee2f7bdec9cb59f0c251e0a1ddd64d9cc82548.exe

  • Size

    243KB

  • Sample

    240704-b7cbkszcna

  • MD5

    f0584ec3946ed12facabaae4789235b7

  • SHA1

    f58a9f4ea1fb7aa409e029fcb0c976dc680ac034

  • SHA256

    906c1863777e91ff508ccb1758ee2f7bdec9cb59f0c251e0a1ddd64d9cc82548

  • SHA512

    ba3c56dcbf49102b7293f6e1e2543668ffc700a352208be48a388cdf03a09f85b7b7366a4e58f6d0f629d76b812822fa5a0efe8ffdb9c2010252e14d94515f19

  • SSDEEP

    3072:rfznzvDu7CYtOsaPDUGAaVIPhVBrP2xtezLAf5spKS6hc:rfznzvDu7zOsu1IwLefAUKdh

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.expresscargoes.net
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    QAZ1234P0#WA

Targets

    • Target

      906c1863777e91ff508ccb1758ee2f7bdec9cb59f0c251e0a1ddd64d9cc82548.exe

    • Size

      243KB

    • MD5

      f0584ec3946ed12facabaae4789235b7

    • SHA1

      f58a9f4ea1fb7aa409e029fcb0c976dc680ac034

    • SHA256

      906c1863777e91ff508ccb1758ee2f7bdec9cb59f0c251e0a1ddd64d9cc82548

    • SHA512

      ba3c56dcbf49102b7293f6e1e2543668ffc700a352208be48a388cdf03a09f85b7b7366a4e58f6d0f629d76b812822fa5a0efe8ffdb9c2010252e14d94515f19

    • SSDEEP

      3072:rfznzvDu7CYtOsaPDUGAaVIPhVBrP2xtezLAf5spKS6hc:rfznzvDu7zOsu1IwLefAUKdh

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks