General

  • Target

    5a74b75c5a7be0610cce2998f083687350ef6d03a7b4ddeda5aca4b270856dbe

  • Size

    384KB

  • Sample

    250109-blevkstqdp

  • MD5

    a020990b12720309622b70ebb2d6e736

  • SHA1

    af6367ba8c7985a95f87dbf0ba5bc7b5dbdc0fef

  • SHA256

    5a74b75c5a7be0610cce2998f083687350ef6d03a7b4ddeda5aca4b270856dbe

  • SHA512

    31f2befbcf869f4371b2ee5bfb5f259b4eb6491f38d35ebe28bf04affa6ed86670e4748665dd79f0ecfd8bc847c6f77e91cbf4ecd3624b43f009081799b09960

  • SSDEEP

    6144:A9sEPx//ltGJzXVsMF2Z2pNnzt5VjBLUxbfOqbciOWd035iMh:kbaJXGoRzjLUxuiOWOJiM

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.sinceregroup-th.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    XN*^#%f5

Targets

    • Target

      5a74b75c5a7be0610cce2998f083687350ef6d03a7b4ddeda5aca4b270856dbe

    • Size

      384KB

    • MD5

      a020990b12720309622b70ebb2d6e736

    • SHA1

      af6367ba8c7985a95f87dbf0ba5bc7b5dbdc0fef

    • SHA256

      5a74b75c5a7be0610cce2998f083687350ef6d03a7b4ddeda5aca4b270856dbe

    • SHA512

      31f2befbcf869f4371b2ee5bfb5f259b4eb6491f38d35ebe28bf04affa6ed86670e4748665dd79f0ecfd8bc847c6f77e91cbf4ecd3624b43f009081799b09960

    • SSDEEP

      6144:A9sEPx//ltGJzXVsMF2Z2pNnzt5VjBLUxbfOqbciOWd035iMh:kbaJXGoRzjLUxuiOWOJiM

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks