General

  • Target

    f1d869db0318276e773c7fd81eff7eb730aeb53799d65550212c5d40c2136a9a

  • Size

    692KB

  • Sample

    240720-bqz2bazeln

  • MD5

    733b3dd4df27fc87e74a40760ebc8197

  • SHA1

    68b6ed23b6ccd7e520872f31564ea69d86024e16

  • SHA256

    f1d869db0318276e773c7fd81eff7eb730aeb53799d65550212c5d40c2136a9a

  • SHA512

    3c67a34b6229803ef43c91e49151bce19f1e53b44eb6ede24cb322e9dc62ac9b8ed231d12bcbd89d2ed4de7554a74d86c1099646ea4b6bd91f55872876199d3e

  • SSDEEP

    12288:s5magq7rNf+wxvlP6DrzbNHTzluE7FPzK62ACvkqTht02aMeddq6YPTDZ:Nq3HvMDrzbNh7FLK627vkqNt0+Qdq6wh

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.deblokhoeve.be
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Blokhoeve2490.i

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      f1d869db0318276e773c7fd81eff7eb730aeb53799d65550212c5d40c2136a9a

    • Size

      692KB

    • MD5

      733b3dd4df27fc87e74a40760ebc8197

    • SHA1

      68b6ed23b6ccd7e520872f31564ea69d86024e16

    • SHA256

      f1d869db0318276e773c7fd81eff7eb730aeb53799d65550212c5d40c2136a9a

    • SHA512

      3c67a34b6229803ef43c91e49151bce19f1e53b44eb6ede24cb322e9dc62ac9b8ed231d12bcbd89d2ed4de7554a74d86c1099646ea4b6bd91f55872876199d3e

    • SSDEEP

      12288:s5magq7rNf+wxvlP6DrzbNHTzluE7FPzK62ACvkqTht02aMeddq6YPTDZ:Nq3HvMDrzbNh7FLK627vkqNt0+Qdq6wh

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks