General

  • Target

    270fd88ae427b78f41c6903ab9c97aa6526c2fcf102cbd95bf2a2bc44fcbed74

  • Size

    713KB

  • Sample

    241120-fp8dhs1pbw

  • MD5

    c6973fd17f93412e14cb579d1b18bfc8

  • SHA1

    6513d067752fcc4deeb741f6a008946a7f7a94c6

  • SHA256

    270fd88ae427b78f41c6903ab9c97aa6526c2fcf102cbd95bf2a2bc44fcbed74

  • SHA512

    32a8caa18c6c4595d6f1b78beffd2f7668992e85c20a7e92270fa833f4e766fe88ee53a7c0fd6723f384730703814689e76eb5e11dcb3bca0963a98170eb20b0

  • SSDEEP

    12288:JOCTAgtskY+V37Hb8/Fn/9J2bDDiFeDVQJdXkAF4DQBqJiyS4sT+0MKicImNS1/9:ICTAbkYs37bShb2XWYD2JxByi14sT+06

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    zqamcx.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Methodman991

Targets

    • Target

      Musterino_94372478_Ekno_101_20241031410530_ekstre.exe

    • Size

      753KB

    • MD5

      7766ffc22475dbdb07730fdd97e9c0c5

    • SHA1

      f744e3b286f1daf7c8cf3df7cf3171d2e7c4675c

    • SHA256

      f69515024de365946c3a58ce3315898196dcca5a2d5a9ba3f5b257818df4055a

    • SHA512

      db2037bc633bca7b9e0f8e75fa18868fc7eef2e4dd1da6fbace26f5ece3bf3c87bd0350a86640d5b7ed54bd937c98b514c25492045d409ea8c7fca34b0ddc1dc

    • SSDEEP

      12288:VrOp+Ri3AgFdEswhJL6+pt8dQ9Hn/9J2bnDiFe1VQddXkAFEDQheJiySyOtt3MKD:7Q3AgEXhJL60t8Qb2DWY12dNhui13/BR

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks