General

  • Target

    3c29b509fac248a90cdb5970352752041fe1c02034f06b81182c5bb8b311766f

  • Size

    699KB

  • Sample

    241120-tlll8syerg

  • MD5

    d8770e0a7f9ee1a53bd4362532ecef3f

  • SHA1

    50745b96bc64c065e8f66bc07589961c15f6ed21

  • SHA256

    3c29b509fac248a90cdb5970352752041fe1c02034f06b81182c5bb8b311766f

  • SHA512

    e5c9a9b14eae8a3b1ab21634388676269ee1da130c8600bcfa78a31f3d48f7706db12cc499f47840843c63af4f6fa720196b96199738bd5af648abb40f1ed0b7

  • SSDEEP

    12288:o3/T3/fVrTtK3/3gCgkhkNRIFzhx+xxyZAcI+KQoKJ/vY2Kcsxgdyi7V8Ane3/zt:orXVrTtK7tR+zyZNTKQoo/vY2exAyi7O

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.metalsbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    zxcA@@258963

Targets

    • Target

      3c29b509fac248a90cdb5970352752041fe1c02034f06b81182c5bb8b311766f

    • Size

      699KB

    • MD5

      d8770e0a7f9ee1a53bd4362532ecef3f

    • SHA1

      50745b96bc64c065e8f66bc07589961c15f6ed21

    • SHA256

      3c29b509fac248a90cdb5970352752041fe1c02034f06b81182c5bb8b311766f

    • SHA512

      e5c9a9b14eae8a3b1ab21634388676269ee1da130c8600bcfa78a31f3d48f7706db12cc499f47840843c63af4f6fa720196b96199738bd5af648abb40f1ed0b7

    • SSDEEP

      12288:o3/T3/fVrTtK3/3gCgkhkNRIFzhx+xxyZAcI+KQoKJ/vY2Kcsxgdyi7V8Ane3/zt:orXVrTtK7tR+zyZNTKQoo/vY2exAyi7O

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks