General

  • Target

    6dfa9d33ae14092a39047fa26cc6826973dc7779f5f73c94a430a1690b4a1101

  • Size

    672KB

  • Sample

    250121-fgz26sxmbk

  • MD5

    a1ecca252943383f6cef90a6272d719e

  • SHA1

    34327568f346f33ccedc859bddbc61d91844a86b

  • SHA256

    6dfa9d33ae14092a39047fa26cc6826973dc7779f5f73c94a430a1690b4a1101

  • SHA512

    4b20913cef7f086294740ff47b9b493484ee556e7b6cf94540c917dbdb304028b0b4d53add1ef4fde65f04c10005981e881e0d5547b9e44ada9b0ce124c0a6d6

  • SSDEEP

    12288:6zztYbSCyFWF0Mye9JWwdy2DDkZP3vrH9U2LtkfERi6B0D4VDFo9sydDrT:+pYUMH5y2nktjdEfERiY0DOBtypT

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.thelamalab.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Thel@malab@20!9

Targets

    • Target

      SOA.exe

    • Size

      778KB

    • MD5

      4b87b32f26b417ddbaaa08391cbf3dfd

    • SHA1

      f870a7b9eec7352c7863f2491cabdb404cf53a0d

    • SHA256

      3729df5275a3dbba2ea3c90fac7796341a6d2c397ceb0bb5fc98b99a7f76df1d

    • SHA512

      5a7e97e4bba2a2cc4b3a3a4a623aa3cb5a252a776a4c9f796b5272d3c1d735bab8fbca2163421d7d3bf1bbe0d37b2a1f864227f2cb545323f9c1fd2339f1a0a7

    • SSDEEP

      12288:2KOlbxrEX0IO8Df3PScPgY93W2dyQ1DkJT39bH9usL9wJExi+ByD4RF3mrU:PX/f1PRxyQhkdlduJExi0yDgF3mA

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks