General

  • Target

    a0f74c405b615828045a96d6eb464f77.bin

  • Size

    619KB

  • Sample

    240727-d37b9svckp

  • MD5

    e8a03977c77c15086944d33d2bc7d640

  • SHA1

    e59a7da521d4bd6bc33695079d1c474b6eb63127

  • SHA256

    96c1737c517af28f0052dc1e8fd59c810a38a5a7e7ba8f34dde8a5a48a0a4479

  • SHA512

    788b24b61d0170fd00ae47b6d03ff5f07c7bdfd117324a9e55b1a918a371514a74019912b8e87ad9c355bf61e31821baed24521c9e8b75f57e268e373822bfb4

  • SSDEEP

    12288:PbsXlEBHxBKWqelKqIoariUM2HY5pLyp4JuHNimvUiwnN7RoMUp:PYXlEBqWqeMqIxrhHY5p2Rpci6Lol

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Password: )NYyffR0

Targets

    • Target

      cc9372baeb26eb7513415fd8da130f514a1add9d50f8f8e02f893b23c6a1a1f3.exe

    • Size

      728KB

    • MD5

      a0f74c405b615828045a96d6eb464f77

    • SHA1

      f2acdcf38ad5293435576cd3b5827d53cd5baeed

    • SHA256

      cc9372baeb26eb7513415fd8da130f514a1add9d50f8f8e02f893b23c6a1a1f3

    • SHA512

      5e9ede6635cce98e9e39cbe91db8b37f9dbef8e8988db8e41b7458246402b8621fb9e6d451919fd03de7292b7bd3975656f16510624929470c4e726dfdf863e9

    • SSDEEP

      12288:jDfm5EmnV+fLDdCL2IBQ3GfV6JJH+HwY+JFWm1CSjEXuTJ6ts5EH+uM:j65EmnVUhCaSQ3yV0Rg+rWm1CxuNdEM

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks