General

  • Target

    4afa99f3b34877cefef636c3a1f4a4360c06df2c31352a9852f30631f20e5bbeexe.exe

  • Size

    695KB

  • Sample

    231205-wyr1wsdh6z

  • MD5

    9caffcd254391a3282cb59565c19fe06

  • SHA1

    c87bf6c1988179062fa05833fa807b3056374c1d

  • SHA256

    4afa99f3b34877cefef636c3a1f4a4360c06df2c31352a9852f30631f20e5bbe

  • SHA512

    fcdd16c0d77aad853c58266a65c746ab095febc6154b9f07f21bf2c9dc4cb49aa674f535537eb719874ea9dc565b442327a606a4b32e0a9aa23cad75ff2c184d

  • SSDEEP

    12288:IVi20xAn87LdAIHBmw4YmiqNKLMWozBY3DQl4:Z2gh9HBR7LMXBY3DL

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    thedress.pk
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    LILKOOLL14!!

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://thedress.pk
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    LILKOOLL14!!

Targets

    • Target

      4afa99f3b34877cefef636c3a1f4a4360c06df2c31352a9852f30631f20e5bbeexe.exe

    • Size

      695KB

    • MD5

      9caffcd254391a3282cb59565c19fe06

    • SHA1

      c87bf6c1988179062fa05833fa807b3056374c1d

    • SHA256

      4afa99f3b34877cefef636c3a1f4a4360c06df2c31352a9852f30631f20e5bbe

    • SHA512

      fcdd16c0d77aad853c58266a65c746ab095febc6154b9f07f21bf2c9dc4cb49aa674f535537eb719874ea9dc565b442327a606a4b32e0a9aa23cad75ff2c184d

    • SSDEEP

      12288:IVi20xAn87LdAIHBmw4YmiqNKLMWozBY3DQl4:Z2gh9HBR7LMXBY3DL

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks