General

  • Target

    8bb490e784e059e201c7eb2043eb65489546f79f6f738868c5d84a9e17ffe261

  • Size

    671KB

  • Sample

    241218-bg4yxaxmbl

  • MD5

    84a503f55bfd0c2e91624d7ecdc16d64

  • SHA1

    6ee1422aa81f8d892ee91a476dbdacff05c7be2b

  • SHA256

    8bb490e784e059e201c7eb2043eb65489546f79f6f738868c5d84a9e17ffe261

  • SHA512

    79ba52db50a1a9df3fa3e05175d13753904de5e1bbab82c04d46b1c13a63df621de7914f034f014f8b828fe56a0882357438a98c3a12f50247e6616b575e4aa5

  • SSDEEP

    12288:B52XxTBWUX50hpH75arDIQXGGuJLruds0t2HV4g9ErNABfTFFSIegj5:z2XdX50xarZXGGuJPfz14ZAJBFSm

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.alltoursegypt.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    OPldome23#12klein

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      NEW ORDER--GO23B005XXXX024.exe

    • Size

      856KB

    • MD5

      bac3a84a01a938c623024c8d5b45ecc0

    • SHA1

      50c8cf4a479cb0afdd911ba0fd506b442d1706bc

    • SHA256

      34fe14a66b789140c2d42bb2d1231092ab9bb7b5a6285610840d980a5bcd3d31

    • SHA512

      76d1de4c8f48e5f1b34995bb2f1c60119bafcc856a532afa291db85f9955b0172d37e2fe34ade7d83027a8d70114a2f92523e30c78e29aa4ed433285119feceb

    • SSDEEP

      12288:NOs8A6/zwgNhpUgzuwlsxTTo+16jUXbR+6MPku+l0CPPz:EzwEpUgzuwluTtmGFYPd+p

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks