General

  • Target

    32ab42e89956de7e5e416d5952a2aac80952b5f97124b27090341ac4463a94d3

  • Size

    602KB

  • Sample

    240909-l4jllasdqq

  • MD5

    98867fd24ee449b12bc31c8ef0b17e94

  • SHA1

    372c46b9f32898e510924b7f3e8735497440729e

  • SHA256

    32ab42e89956de7e5e416d5952a2aac80952b5f97124b27090341ac4463a94d3

  • SHA512

    3395cdd917a58c7063917b025d6dbdc53c91ac06efa8dd37095a3949f71d5d132d8f41f4f5a3e77b517e39e15f95121e1559101a8897c0ef3c2619062c6e5fb1

  • SSDEEP

    12288:QfK900Q4Rb4uKPfMxzkqkvXfuGcvh/E1cgKttJ6K4MLlCHelB1TCUQH371n+Ti:KK/QShK8a/uXvh/ZgKtGeLl01UQHL4m

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.alitextile.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Myname@321

Targets

    • Target

      DBG1475766.pdf.scr

    • Size

      666KB

    • MD5

      ceed99d84eed3e759728b9eeea0be0c7

    • SHA1

      54084910a2c7ca660b644dece24e04130fa4d227

    • SHA256

      838053d3c2a1423831cad1dc9b8ca3f036328c05d2cb5c81fbb18dda832aad54

    • SHA512

      7af4117132a1fac74288e0b09a8c49413ad51c6732b493527c8c1462c3c21956cbf8827aae3b7ede27215e28b304682ab5269f8479169f7e07f9dbb5df590838

    • SSDEEP

      12288:XGD8U5frL49pJE2e0ij/btr6YoJ3dk5mYBoD9Qah3irjC9i72lMW:m8U5fg9fE/0ijhrZojksBQqirjCkEMW

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks