General

  • Target

    9be04a6e09ffd0487845f8a81e1803f13063318bfe8b046879ca813bdb19b4a8

  • Size

    852KB

  • Sample

    250125-bp638szlan

  • MD5

    4e036eb64980025f6dccc33445103468

  • SHA1

    b80ad79ed0e04a54eb9227b258a14cbcdb40d294

  • SHA256

    9be04a6e09ffd0487845f8a81e1803f13063318bfe8b046879ca813bdb19b4a8

  • SHA512

    800fca3fbc4117bdbdbeddd5b9e1ffeb505e548b962e567afa0168dc9db324c4bf859dd87989568d4a3af1736c7009d39cecb719c554694bcf1137e941ca5be5

  • SSDEEP

    12288:j0Znx1Zfawr7inq8OyEQOopDloIt77/DN+81cL+xg/m12qD74VYX:ux1Zfn7inuwhtDFN+8WC

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    serv-10708.handsonwebhosting.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    icui4cu2@@

Targets

    • Target

      9be04a6e09ffd0487845f8a81e1803f13063318bfe8b046879ca813bdb19b4a8

    • Size

      852KB

    • MD5

      4e036eb64980025f6dccc33445103468

    • SHA1

      b80ad79ed0e04a54eb9227b258a14cbcdb40d294

    • SHA256

      9be04a6e09ffd0487845f8a81e1803f13063318bfe8b046879ca813bdb19b4a8

    • SHA512

      800fca3fbc4117bdbdbeddd5b9e1ffeb505e548b962e567afa0168dc9db324c4bf859dd87989568d4a3af1736c7009d39cecb719c554694bcf1137e941ca5be5

    • SSDEEP

      12288:j0Znx1Zfawr7inq8OyEQOopDloIt77/DN+81cL+xg/m12qD74VYX:ux1Zfn7inuwhtDFN+8WC

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • AgentTesla payload

    • Drops file in Drivers directory

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks