General

  • Target

    7b153edb20d7b9ad2a7580e0a540861478651ea243110417a6a317457069a50e

  • Size

    215KB

  • Sample

    250116-bjh48avlgj

  • MD5

    ee8ef9cda5a27c085be8bcf2b27fed9a

  • SHA1

    e86edec732f293fd382e59eefb7167f3c22b4fb3

  • SHA256

    7b153edb20d7b9ad2a7580e0a540861478651ea243110417a6a317457069a50e

  • SHA512

    c610d4bb47fb4a4a15435577e891073cd03a32cd27ba9dee78dae5a605920be1d065dbbaf3025246a3356e3bf3f5279d1b00b0c3e87fe359f689e57c0638432d

  • SSDEEP

    6144:yTwpT4oAwoYgR8U+BTBV/Sqn8s6TEZLU:yTwp1hBVK5s6Ts

Malware Config

Extracted

Family

agenttesla

C2

http://103.147.185.68/j/p15ww/mawa/e483d6564638acbf4559.php

Targets

    • Target

      7b153edb20d7b9ad2a7580e0a540861478651ea243110417a6a317457069a50e

    • Size

      215KB

    • MD5

      ee8ef9cda5a27c085be8bcf2b27fed9a

    • SHA1

      e86edec732f293fd382e59eefb7167f3c22b4fb3

    • SHA256

      7b153edb20d7b9ad2a7580e0a540861478651ea243110417a6a317457069a50e

    • SHA512

      c610d4bb47fb4a4a15435577e891073cd03a32cd27ba9dee78dae5a605920be1d065dbbaf3025246a3356e3bf3f5279d1b00b0c3e87fe359f689e57c0638432d

    • SSDEEP

      6144:yTwpT4oAwoYgR8U+BTBV/Sqn8s6TEZLU:yTwp1hBVK5s6Ts

    • Drops file in Drivers directory

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks