General

  • Target

    0b429b59c4dbb5486fa18836787e86ff89e74c0f6735c2d8048c9caa62ba5774

  • Size

    419KB

  • Sample

    241124-bkkpfawncx

  • MD5

    d64693a30cb157561476ed6849d0253c

  • SHA1

    86f5bae3594325e4ba3187b22afaabf220a26f7f

  • SHA256

    0b429b59c4dbb5486fa18836787e86ff89e74c0f6735c2d8048c9caa62ba5774

  • SHA512

    230c3e9c13ce693db9e8f67bc97d760a171c401d04f4c3617ca667d0403f0470ca7ced844ad6e5d62a37cdc790afc8db408046e935710deef806d7a858d8bc09

  • SSDEEP

    12288:i/NNz+/Z8elABlehoAX3bWJDU8ienbQTh8:i/Nm8+hIJDlHnbQC

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    mommy2158

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    mommy2158

Targets

    • Target

      0b429b59c4dbb5486fa18836787e86ff89e74c0f6735c2d8048c9caa62ba5774

    • Size

      419KB

    • MD5

      d64693a30cb157561476ed6849d0253c

    • SHA1

      86f5bae3594325e4ba3187b22afaabf220a26f7f

    • SHA256

      0b429b59c4dbb5486fa18836787e86ff89e74c0f6735c2d8048c9caa62ba5774

    • SHA512

      230c3e9c13ce693db9e8f67bc97d760a171c401d04f4c3617ca667d0403f0470ca7ced844ad6e5d62a37cdc790afc8db408046e935710deef806d7a858d8bc09

    • SSDEEP

      12288:i/NNz+/Z8elABlehoAX3bWJDU8ienbQTh8:i/Nm8+hIJDlHnbQC

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks