General

  • Target

    f18d13960773c802610a4bbba296c3be07aee2495b02bb34cde53f15fedc4de2

  • Size

    1.1MB

  • Sample

    250114-bz59pavqfl

  • MD5

    4b563d80581c94cb9aa2590a4e35a3b8

  • SHA1

    4006ae9b9d082c887ac27b1d5a0ff124a5dee056

  • SHA256

    f18d13960773c802610a4bbba296c3be07aee2495b02bb34cde53f15fedc4de2

  • SHA512

    9f0b6f4c6ad3ded9b3963448ad381873d3ae80c4742db7fc222c512d72be565ac73b903b085cc6cee8dc474b3d66e1fe0600af97765a5f415e8e2cd36863acdc

  • SSDEEP

    24576:QsDjZPoyTVCrXGcVKmx3+LmNVlNLXDDFm15He0ZW6Ttwz/GH69D:BDjloyTV6XVZp+wVlNLtQ5+wWb/J

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    churchboy10

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    churchboy10

Targets

    • Target

      f18d13960773c802610a4bbba296c3be07aee2495b02bb34cde53f15fedc4de2

    • Size

      1.1MB

    • MD5

      4b563d80581c94cb9aa2590a4e35a3b8

    • SHA1

      4006ae9b9d082c887ac27b1d5a0ff124a5dee056

    • SHA256

      f18d13960773c802610a4bbba296c3be07aee2495b02bb34cde53f15fedc4de2

    • SHA512

      9f0b6f4c6ad3ded9b3963448ad381873d3ae80c4742db7fc222c512d72be565ac73b903b085cc6cee8dc474b3d66e1fe0600af97765a5f415e8e2cd36863acdc

    • SSDEEP

      24576:QsDjZPoyTVCrXGcVKmx3+LmNVlNLXDDFm15He0ZW6Ttwz/GH69D:BDjloyTV6XVZp+wVlNLtQ5+wWb/J

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks