General

  • Target

    RFQ#00388-SJOMAN ENGINEERING LLC.exe

  • Size

    885KB

  • Sample

    230301-js9yasfc66

  • MD5

    0db685d98e98abaf4214262dec358b6f

  • SHA1

    66b3f2a05061b53ecc5ef881400f1ef30452f2b3

  • SHA256

    66b93d3953720772c3adf5f424c5dc4d5e6a61c7e9d08157ccf8ad9eec069f1c

  • SHA512

    5896e9851f34b82f0a4da16f698b12ccca1c6685480d9dda8de09c51263f0ec8d3e888166453d84e5b0e5f52ef4968d51d2b4410e79421b5153282bb16d8f478

  • SSDEEP

    12288:IKQa8hYsUkIq6HE0rwKfNvhM8fhLsYX8CdClLqbMqcESTQxNqv6nnjqKoeM:IT0p7rFNvhMAsYZduLDPEp26nnjqKoeM

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.kamtechworld.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    **noE&0Reh[0

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.kamtechworld.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    **noE&0Reh[0

Targets

    • Target

      RFQ#00388-SJOMAN ENGINEERING LLC.exe

    • Size

      885KB

    • MD5

      0db685d98e98abaf4214262dec358b6f

    • SHA1

      66b3f2a05061b53ecc5ef881400f1ef30452f2b3

    • SHA256

      66b93d3953720772c3adf5f424c5dc4d5e6a61c7e9d08157ccf8ad9eec069f1c

    • SHA512

      5896e9851f34b82f0a4da16f698b12ccca1c6685480d9dda8de09c51263f0ec8d3e888166453d84e5b0e5f52ef4968d51d2b4410e79421b5153282bb16d8f478

    • SSDEEP

      12288:IKQa8hYsUkIq6HE0rwKfNvhM8fhLsYX8CdClLqbMqcESTQxNqv6nnjqKoeM:IT0p7rFNvhMAsYZduLDPEp26nnjqKoeM

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks