General

  • Target

    307f4eec8d8a90ea37f0eeffdebc7e5c997dbcecaee6b5e86ea8e06b0bea792e

  • Size

    262KB

  • Sample

    241227-bjh48axmgs

  • MD5

    0ec2fb4b97332149d5e34e7ec209b9af

  • SHA1

    a5d3aef57716ac4c8fe4e5925c196eb277fed3f0

  • SHA256

    307f4eec8d8a90ea37f0eeffdebc7e5c997dbcecaee6b5e86ea8e06b0bea792e

  • SHA512

    d01530eb04356b4be790ea0980d541a7f177992c31e6e87156c9a94b70579f51ba7ebe74cb8aa0edb413a4bb9f61a45ce322b7a0aede38fbf90f938f7ab59ea9

  • SSDEEP

    6144:he0jpV/9dUcwSyZrCjpUAYYYNZTSwUZ+bIUJpGlEjqZ4FPdjBLk:he0jb/9dU3SyZrCjpPYYYrTHUZgjjB

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    zqamcx.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Anambraeast@2023

Targets

    • Target

      307f4eec8d8a90ea37f0eeffdebc7e5c997dbcecaee6b5e86ea8e06b0bea792e

    • Size

      262KB

    • MD5

      0ec2fb4b97332149d5e34e7ec209b9af

    • SHA1

      a5d3aef57716ac4c8fe4e5925c196eb277fed3f0

    • SHA256

      307f4eec8d8a90ea37f0eeffdebc7e5c997dbcecaee6b5e86ea8e06b0bea792e

    • SHA512

      d01530eb04356b4be790ea0980d541a7f177992c31e6e87156c9a94b70579f51ba7ebe74cb8aa0edb413a4bb9f61a45ce322b7a0aede38fbf90f938f7ab59ea9

    • SSDEEP

      6144:he0jpV/9dUcwSyZrCjpUAYYYNZTSwUZ+bIUJpGlEjqZ4FPdjBLk:he0jb/9dU3SyZrCjpPYYYrTHUZgjjB

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks