General

  • Target

    9191f5a9acd51585880fb47d8992aada6cfea3c7a9af9909cbd32eef49862acf

  • Size

    656KB

  • Sample

    250115-brwehsxrdr

  • MD5

    20eab4da117b7ebad0bcff4d1ad652e5

  • SHA1

    79255c5d759ae4c863baec1dfb14abe716f1c247

  • SHA256

    9191f5a9acd51585880fb47d8992aada6cfea3c7a9af9909cbd32eef49862acf

  • SHA512

    2b7e5829f20d992b5fd765bfcbb7d4a3b3902ef4bc595f0016fb016dd1d3977c2ac53c61fbd32219d59272d405352a34fb158cf56523a76f8979c77c7ea1ec47

  • SSDEEP

    12288:eEAtK9wwc6omPlFvajBrXAWZFMZONdA8B2/7w6mIMQ5V2p4gZGj+oO/i:+tK9wwImP/+JAo2OY3ntj+o8i

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.stilbo.eu
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    StilBO_#1

Targets

    • Target

      NEW SIGNED CONTRACTS.exe

    • Size

      719KB

    • MD5

      c8c2b93f8b79377e5d346edfbf9504b3

    • SHA1

      0e38e95f3cdba184363c9b2930a5f4d7d84895c2

    • SHA256

      58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918

    • SHA512

      1d1dc875502359ee460fe6ad3437cfe3c511b9a18916a95f21ce3d5eae389b32029dc5f943d64f115cafaeb58d140b965a51bb5f6b837aadf0f1243c7d7fc571

    • SSDEEP

      12288:ufZYRxA4Y5lyA/BxSPCn2m9ugFv4ji7X6RejFjb4+Z8ZLe9MQcIneW1caCoLXz4E:DRa2mAqUijSej9b4K+LccOeN4Xz4H1

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks