General

  • Target

    03207279845f2d90be8cd6b3b525c4a236838c52def79c0afffbdf7216a03b7c

  • Size

    709KB

  • Sample

    241116-3ynf2awhjc

  • MD5

    9164f558b98c859744b070442f4d4f01

  • SHA1

    63b26d055e7b62b8c87668421a36c6af30ebea1f

  • SHA256

    03207279845f2d90be8cd6b3b525c4a236838c52def79c0afffbdf7216a03b7c

  • SHA512

    9abc886380f1a7f9f5ba10db1da44b5a8e8d5f870d26f9b45ad699f5dd3c7e9d36ad658d12e8645b523228bc0b30ca6504e4982ec55f9341dc3a88bdb3aeb350

  • SSDEEP

    12288:sNaDPw1Qk89Tmy4azzNLYjzOPmgY2N2Kde0pIVC7e748Ylu/7RBoyQdWvsBptkkR:sULw9gTF4aNLBK20Kd/Moe748Yk/9KyK

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    zqamcx.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Methodman991

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      03207279845f2d90be8cd6b3b525c4a236838c52def79c0afffbdf7216a03b7c

    • Size

      709KB

    • MD5

      9164f558b98c859744b070442f4d4f01

    • SHA1

      63b26d055e7b62b8c87668421a36c6af30ebea1f

    • SHA256

      03207279845f2d90be8cd6b3b525c4a236838c52def79c0afffbdf7216a03b7c

    • SHA512

      9abc886380f1a7f9f5ba10db1da44b5a8e8d5f870d26f9b45ad699f5dd3c7e9d36ad658d12e8645b523228bc0b30ca6504e4982ec55f9341dc3a88bdb3aeb350

    • SSDEEP

      12288:sNaDPw1Qk89Tmy4azzNLYjzOPmgY2N2Kde0pIVC7e748Ylu/7RBoyQdWvsBptkkR:sULw9gTF4aNLBK20Kd/Moe748Yk/9KyK

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks