General

  • Target

    2c617b59bd5edc12640df918dd4288b3cbf4005df833881cc8635c327b7c9a14

  • Size

    732KB

  • Sample

    241124-bs12dssqhj

  • MD5

    27b98e0345639a3ef8a18f0e083587fa

  • SHA1

    788b7dce8b0135241dbf9d575882d83b0af7bc17

  • SHA256

    2c617b59bd5edc12640df918dd4288b3cbf4005df833881cc8635c327b7c9a14

  • SHA512

    c6554c9bd539881723b7d5008533789076bbf3517615ef5b462505d43f2ee965e7693702be02ffe07128de5fd270952e61a24d8bd1d6e4797f8d1a94876ef558

  • SSDEEP

    12288:IxIdYmgrbZZEj9OvfgqEdodsXfjs1pYwmwfcArlZiDMfT80EgY91xaE3Ep+P8hB:AQgXhoHg8YjJ9NlZSA5F

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.goldentravel.ec
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    chinadusco@5555343

Targets

    • Target

      2c617b59bd5edc12640df918dd4288b3cbf4005df833881cc8635c327b7c9a14

    • Size

      732KB

    • MD5

      27b98e0345639a3ef8a18f0e083587fa

    • SHA1

      788b7dce8b0135241dbf9d575882d83b0af7bc17

    • SHA256

      2c617b59bd5edc12640df918dd4288b3cbf4005df833881cc8635c327b7c9a14

    • SHA512

      c6554c9bd539881723b7d5008533789076bbf3517615ef5b462505d43f2ee965e7693702be02ffe07128de5fd270952e61a24d8bd1d6e4797f8d1a94876ef558

    • SSDEEP

      12288:IxIdYmgrbZZEj9OvfgqEdodsXfjs1pYwmwfcArlZiDMfT80EgY91xaE3Ep+P8hB:AQgXhoHg8YjJ9NlZSA5F

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • AgentTesla payload

    • Drops file in Drivers directory

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks