General

  • Target

    c853e394fa9ae26939db51c52c954db24a4a811efb19d1a89554781f372c8ccf

  • Size

    325KB

  • Sample

    250109-bnrbds1ras

  • MD5

    fef06929ab855016aa963861f71fd08c

  • SHA1

    d04a6828e44245ac8b4cb52670f1de33938f6099

  • SHA256

    c853e394fa9ae26939db51c52c954db24a4a811efb19d1a89554781f372c8ccf

  • SHA512

    58c793d4aeceb174fa30a254228f6fa0285572cb4adfc43b0be9b93e3868a4de05916d598a83447ab9b16226eb051fe33f89d7d660ff42f912b2d9d17a6a62d1

  • SSDEEP

    6144:SBl2yEoYxHMhopt4Tgb1JTofxMLb+Nc2Lneasbr7w1izbu:ql2yEouHl1JTl72bsbr

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    server257.web-hosting.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    QFLj2#~CYpH8

Targets

    • Target

      c853e394fa9ae26939db51c52c954db24a4a811efb19d1a89554781f372c8ccf

    • Size

      325KB

    • MD5

      fef06929ab855016aa963861f71fd08c

    • SHA1

      d04a6828e44245ac8b4cb52670f1de33938f6099

    • SHA256

      c853e394fa9ae26939db51c52c954db24a4a811efb19d1a89554781f372c8ccf

    • SHA512

      58c793d4aeceb174fa30a254228f6fa0285572cb4adfc43b0be9b93e3868a4de05916d598a83447ab9b16226eb051fe33f89d7d660ff42f912b2d9d17a6a62d1

    • SSDEEP

      6144:SBl2yEoYxHMhopt4Tgb1JTofxMLb+Nc2Lneasbr7w1izbu:ql2yEouHl1JTl72bsbr

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks