General

  • Target

    rPO_CW00402902400429.exe

  • Size

    1.1MB

  • Sample

    240925-n3fvestemj

  • MD5

    a95188ad665b3b47e8f51ef7f0b9febc

  • SHA1

    b6dc86a86e20ad925f96cb3e6d192833df5bb800

  • SHA256

    169f892590fa77d8ab87886ab133ed61389f5d21c8830cbc3941785e55685166

  • SHA512

    56bfad1acc7c2c7cf551544bbec51e4649b1bc46fe7290f5f949bf18a31bac621a05e91849e181030010503efad743289883bca518bdb9df979474adfc4f2516

  • SSDEEP

    12288:lum5ax6cGR+jpSV5S0xTWzWuAOHzEr7g4SKEWx893efm929iuRld4i8DpgP:lum5E6lRrSsWhEr7gOEWxI0m9W/8Dp4

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.visiontrade.ae
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ,,.Ishaq2021 ,,

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      rPO_CW00402902400429.exe

    • Size

      1.1MB

    • MD5

      a95188ad665b3b47e8f51ef7f0b9febc

    • SHA1

      b6dc86a86e20ad925f96cb3e6d192833df5bb800

    • SHA256

      169f892590fa77d8ab87886ab133ed61389f5d21c8830cbc3941785e55685166

    • SHA512

      56bfad1acc7c2c7cf551544bbec51e4649b1bc46fe7290f5f949bf18a31bac621a05e91849e181030010503efad743289883bca518bdb9df979474adfc4f2516

    • SSDEEP

      12288:lum5ax6cGR+jpSV5S0xTWzWuAOHzEr7g4SKEWx893efm929iuRld4i8DpgP:lum5E6lRrSsWhEr7gOEWxI0m9W/8Dp4

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks