General

  • Target

    94e6375f2c717ce7ea4fd191695ef24b439dd38a47d19825c2addd9ed42ec519

  • Size

    325KB

  • Sample

    250109-blngqa1qa1

  • MD5

    fbf91020a49737968f0b66809344be70

  • SHA1

    48461c8c23347453ba4cda2b0827f4fe579e2989

  • SHA256

    94e6375f2c717ce7ea4fd191695ef24b439dd38a47d19825c2addd9ed42ec519

  • SHA512

    94f43507706368b99e8db03a56d3b62850595046827972a117912b8478bc9bd52fff80aaab062e8290d8b9bf16ac5f85b6f90bc6e300038258794cfc3b1c1f16

  • SSDEEP

    6144:RQlBVcATm8dlABtRXdtOjRNTJnXzCQ49vZ7iLbEbo:RQJlABtRbKOZ7

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    server257.web-hosting.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    pLt8$B@JXfOJ

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    server257.web-hosting.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    pLt8$B@JXfOJ

Targets

    • Target

      94e6375f2c717ce7ea4fd191695ef24b439dd38a47d19825c2addd9ed42ec519

    • Size

      325KB

    • MD5

      fbf91020a49737968f0b66809344be70

    • SHA1

      48461c8c23347453ba4cda2b0827f4fe579e2989

    • SHA256

      94e6375f2c717ce7ea4fd191695ef24b439dd38a47d19825c2addd9ed42ec519

    • SHA512

      94f43507706368b99e8db03a56d3b62850595046827972a117912b8478bc9bd52fff80aaab062e8290d8b9bf16ac5f85b6f90bc6e300038258794cfc3b1c1f16

    • SSDEEP

      6144:RQlBVcATm8dlABtRXdtOjRNTJnXzCQ49vZ7iLbEbo:RQJlABtRbKOZ7

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks