General

  • Target

    a13e4b8d6cf119f3b71a2b0ac96482e6d613e3bbf1d5ed240fd88868bca29610

  • Size

    274KB

  • Sample

    240711-btsfms1djk

  • MD5

    e8c1947f53d0b42c3e539796c1a96fc3

  • SHA1

    4a1902ab559ae5bcc98c3027a4ca039aaca3832b

  • SHA256

    a13e4b8d6cf119f3b71a2b0ac96482e6d613e3bbf1d5ed240fd88868bca29610

  • SHA512

    81aaae1bee55366d274026004b4545ac7e73488c44da7284c953c544f6c64fb67866b44b62494adaaea6739937a93ac3aa007c791816bcd061440248ba8e3797

  • SSDEEP

    6144:iLehTeEAuvB0KwcMc51mZpdUZ0tc6uwrhmWQcrF9noAgpkqD:iLmeE/vB0TXcmZUZMBrhm0rF9noRy8

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    162.254.34.31
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    M992uew1mw6Z

Targets

    • Target

      a13e4b8d6cf119f3b71a2b0ac96482e6d613e3bbf1d5ed240fd88868bca29610

    • Size

      274KB

    • MD5

      e8c1947f53d0b42c3e539796c1a96fc3

    • SHA1

      4a1902ab559ae5bcc98c3027a4ca039aaca3832b

    • SHA256

      a13e4b8d6cf119f3b71a2b0ac96482e6d613e3bbf1d5ed240fd88868bca29610

    • SHA512

      81aaae1bee55366d274026004b4545ac7e73488c44da7284c953c544f6c64fb67866b44b62494adaaea6739937a93ac3aa007c791816bcd061440248ba8e3797

    • SSDEEP

      6144:iLehTeEAuvB0KwcMc51mZpdUZ0tc6uwrhmWQcrF9noAgpkqD:iLmeE/vB0TXcmZUZMBrhm0rF9noRy8

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • PureLog Stealer

      PureLog Stealer is an infostealer written in C#.

    • PureLog Stealer payload

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks