General

  • Target

    2c1b4e2c7b044dbd6bdfdc707a764660f2e669e1649dc9f66fe1085fbd34b9c9

  • Size

    239KB

  • Sample

    240829-kk2gmascmb

  • MD5

    933576fd09fa7e93c68788bda6084e7a

  • SHA1

    d8b1a231e401f57e0b7cccc73ceffc70c9d276cd

  • SHA256

    2c1b4e2c7b044dbd6bdfdc707a764660f2e669e1649dc9f66fe1085fbd34b9c9

  • SHA512

    fec4b8ef8861b7a93bd812552be16898a92b6a0afa6706d1e270b37d2877c3497c31a811a7524c7c88f0fb7e40814b83c18139a194a9f4aaed5488ceea2aa5ce

  • SSDEEP

    3072:1z10dfowgoYU0m6slOgOMT1RU25Skzodj553OiknKSUr0:1qdfowgoYUn6+OMBpPUVpknt

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.transarbe.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    EkH1awjsCu

Targets

    • Target

      2c1b4e2c7b044dbd6bdfdc707a764660f2e669e1649dc9f66fe1085fbd34b9c9

    • Size

      239KB

    • MD5

      933576fd09fa7e93c68788bda6084e7a

    • SHA1

      d8b1a231e401f57e0b7cccc73ceffc70c9d276cd

    • SHA256

      2c1b4e2c7b044dbd6bdfdc707a764660f2e669e1649dc9f66fe1085fbd34b9c9

    • SHA512

      fec4b8ef8861b7a93bd812552be16898a92b6a0afa6706d1e270b37d2877c3497c31a811a7524c7c88f0fb7e40814b83c18139a194a9f4aaed5488ceea2aa5ce

    • SSDEEP

      3072:1z10dfowgoYU0m6slOgOMT1RU25Skzodj553OiknKSUr0:1qdfowgoYUn6+OMBpPUVpknt

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks