General

  • Target

    2eeec947de3dee177c0a5ff2727e98953d0285f174b43074fee0a6e909c1593a

  • Size

    871B

  • Sample

    240710-e7rytayfkc

  • MD5

    44b0b0fb0807e477203e42d50bc0b18f

  • SHA1

    62c867f3f56971365d90103240ed1a37593d2333

  • SHA256

    60358b73ca1b3b46d4eac76de7770bf6a4869e87fa94ca1709e15cc39b8e52c2

  • SHA512

    563a3f6b9491d81ddd6b440df78c96fe692c5696b306f163a010c132a2ab7b04764ebc8ff8bd1f49fbc09a9d4d66639f35e18a1e6d0048a071fcdce588327f0b

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    bizr usjt guapiims

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      2eeec947de3dee177c0a5ff2727e98953d0285f174b43074fee0a6e909c1593a

    • Size

      7KB

    • MD5

      bc80530079fd263dd26e267d797cd4ad

    • SHA1

      54215542d4c17815915c2aa3efe76605b394092f

    • SHA256

      2eeec947de3dee177c0a5ff2727e98953d0285f174b43074fee0a6e909c1593a

    • SHA512

      64799c7cd10dff4c002f7ac77db485593d13b6f79a983e9b7c785e8a411958b10238daae69f8549e52977413eb0226070448f7813283780563bd493afc7b8580

    • SSDEEP

      192:tIiianBNVi8xF1wG1FbIPieeRXtXqHUUN7i592E:tIiianBNVi8n1wG1FbIPieeRXtXqHUUW

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks