General

  • Target

    856076a266bf66744428123e379d6e54.bin

  • Size

    643KB

  • Sample

    240706-dhlvtsteqp

  • MD5

    a35bf021d3b986187da3449766d95673

  • SHA1

    a6dfd92144dbe28c1cdd95daad04361253500a4c

  • SHA256

    bf87553e14722b2f7c2649114685bfc258e4d205eb2c3b70ff403a11b06e63e5

  • SHA512

    a8db6ec92f040e8376c19fe66a47313ded580c65bdaea4f11cdd32221d42b72d88b213e5ec6b2213daebfba7705f9baa2c4c64bb1c15de9c5264785588906281

  • SSDEEP

    12288:Z6QXk+AfNrjLZDIjdbjWldl3Jyf66ec95D4uBarAD9d9t46LNMQxuIOaPd:Zq+A51DIjd23lZC6ZcPcuBp5C6LBOaPd

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://beirutrest.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    9yXQ39wz(uL+

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    beirutrest.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    9yXQ39wz(uL+

Targets

    • Target

      c09cba9da1f8a6c8fbda87ce1c29455118eb13876286388a7d768ba98585aa78.exe

    • Size

      717KB

    • MD5

      856076a266bf66744428123e379d6e54

    • SHA1

      88e2e194d5944b748671fefa67c61d3c48af7cf6

    • SHA256

      c09cba9da1f8a6c8fbda87ce1c29455118eb13876286388a7d768ba98585aa78

    • SHA512

      a5aeb1f440fb332eb5c8cac0ac2c2a5027984acf87c16716e5e96620fd4e379e0a07776e35c2099221ae21ad440d83ec98ca6f6bcd7bc163d6c56d91e52458da

    • SSDEEP

      12288:4cxbJytLuL+vKDrPvBMVe/CPMvLM2isPhGCMQJ46Bh7zl:4cxbJnHegVTHisJYjUhN

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks