General

  • Target

    1dJhrysonhGIP1t.exe

  • Size

    858KB

  • Sample

    240919-j4w6ksyhnn

  • MD5

    8c6a2f8527cc492a0eadc806afdf202b

  • SHA1

    786c1a1be2f14183987f873bcee7d678bc73b854

  • SHA256

    a3cc22f2cf9332b073746d69a929930e5eae681897eba61bbd55477f813fb312

  • SHA512

    3bd38b71cee3895fbe87c51f85501f74c79d61f7f2d42f87df3958018c47724961a1dbd68ac857a007c17f0ed37accb1f9bf4cacf7b218c869a715d858b1ffb5

  • SSDEEP

    24576:LcbGHsyM0D255j1DN58O16VKfejB6o1D:MGMDpVmd6o1

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.apexrnun.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    %qroUozO;(C2Rlyb

Targets

    • Target

      1dJhrysonhGIP1t.exe

    • Size

      858KB

    • MD5

      8c6a2f8527cc492a0eadc806afdf202b

    • SHA1

      786c1a1be2f14183987f873bcee7d678bc73b854

    • SHA256

      a3cc22f2cf9332b073746d69a929930e5eae681897eba61bbd55477f813fb312

    • SHA512

      3bd38b71cee3895fbe87c51f85501f74c79d61f7f2d42f87df3958018c47724961a1dbd68ac857a007c17f0ed37accb1f9bf4cacf7b218c869a715d858b1ffb5

    • SSDEEP

      24576:LcbGHsyM0D255j1DN58O16VKfejB6o1D:MGMDpVmd6o1

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks