General

  • Target

    QUOTATION#235878.exe

  • Size

    893KB

  • Sample

    230330-jd6bkabe55

  • MD5

    87a0518430f27f497e7d311547c3cc49

  • SHA1

    3105b3ed593ca26a4faaf253c8ad037a8adacf8e

  • SHA256

    a7c284be487a9a722313747a9d976173d074e4463ededc53668cd925b7793147

  • SHA512

    3102f443d1865bfb69cf204b067493861aaf40e4245fda3c1bfa987f29100eb75aee10f4f56cfe49eb9dd55b6f957a0c3a34ed96bc5803dbb76b622c7464a6f7

  • SSDEEP

    12288:d+nA3fWDsZt6wlr0T4ytyFAGuNPeG9rHJRhip1qJv6nnjqKoea:AA3fWDsT6wl0ByJRG973CqZ6nnjqKoea

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.code-jet.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Xec[t)4]dk2D

Targets

    • Target

      QUOTATION#235878.exe

    • Size

      893KB

    • MD5

      87a0518430f27f497e7d311547c3cc49

    • SHA1

      3105b3ed593ca26a4faaf253c8ad037a8adacf8e

    • SHA256

      a7c284be487a9a722313747a9d976173d074e4463ededc53668cd925b7793147

    • SHA512

      3102f443d1865bfb69cf204b067493861aaf40e4245fda3c1bfa987f29100eb75aee10f4f56cfe49eb9dd55b6f957a0c3a34ed96bc5803dbb76b622c7464a6f7

    • SSDEEP

      12288:d+nA3fWDsZt6wlr0T4ytyFAGuNPeG9rHJRhip1qJv6nnjqKoea:AA3fWDsT6wl0ByJRG973CqZ6nnjqKoea

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks