General

  • Target

    a7ff0e0b901c2f9cfc1d6ccb3217240cb3245360136617f8b880b657a6246421

  • Size

    558KB

  • Sample

    240917-y7gmmatbmj

  • MD5

    592adf5fb51e7c614b8f131381175e5d

  • SHA1

    7c9511c59654d9dfdb2a7d0fdab9cc353b8b7f87

  • SHA256

    a7ff0e0b901c2f9cfc1d6ccb3217240cb3245360136617f8b880b657a6246421

  • SHA512

    d32f6ee88e9cfc5962ae61f742ede0eae8bd40a64815c8aac1b0c8b6390d760950b13b330e8d38b46d662a7d4701f307aef0fb987c9daea6818db3a8f0033538

  • SSDEEP

    12288:zmXd0N+U7Sxcnm/kiH72Yi8ltxtkfF5LsaWD9DJWVFoZ1mRouPUW:zmNS+UGmnm/gYXt8sv9DJfSRPcW

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    DANIEL3116

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    DANIEL3116

Targets

    • Target

      c7513589f3f2e02007be1301c2f08c8809ea7526d85d7efcaf3bccf767a38855.exe

    • Size

      666KB

    • MD5

      31f840efbb9f5116f6bf1334c1fd55fd

    • SHA1

      003cc6c66f94c65625ea9506d71741662e28b8f4

    • SHA256

      c7513589f3f2e02007be1301c2f08c8809ea7526d85d7efcaf3bccf767a38855

    • SHA512

      22ee4bc1c8f0b889fb61a3ae89c8302689eaaaa7dcf1ced4ccdc6ecb6ef6bc16173175e5adcf4d25d5c13c1c0b9e6bdb0dafe5973fa4a5c8000060472408b980

    • SSDEEP

      12288:3Bu9Wtu1btCYwnZcA+9VdGpf5ptSR3vSRgTsUrtUY/6ion:xu9WtECYwZP+DdusR3vSRgTdrym6p

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks