General

  • Target

    2732e42880d8c6a861cf2b2c3ebeb47304f1f1d4b09ea0a9ec5ae730b946c259

  • Size

    1.2MB

  • Sample

    231208-cmrffaaa2x

  • MD5

    1c416c795d2acfdf876a6e96bbbb1c99

  • SHA1

    c023b74808fd6ee76d4ee939642b1e101d5916a0

  • SHA256

    2732e42880d8c6a861cf2b2c3ebeb47304f1f1d4b09ea0a9ec5ae730b946c259

  • SHA512

    40d39a54edf87994dd345fe1dde5728b3e3cf1af941df535fae3ca0b4594f5cb6ae3c37cd62f049e9f983eb6988dc65e4394af54a1f1b8d160db22d775797951

  • SSDEEP

    12288:3wFGHEXEzFGj9F5qx5DJlm2HlzYmdMylgimtdYM3O0V7bb:35HEXl9y1lrz7lgZtub0V7

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.vvspijkenisse.nl
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    playingboyz231

Targets

    • Target

      COMANDA FINALAZD33166-pdf.exe

    • Size

      699KB

    • MD5

      9444e71802e12684478363233fd62c92

    • SHA1

      f2b4bd9162b591b2a2f4202934145864e16053fb

    • SHA256

      844d1e148e8c3b897bb0443f74b1bde3da7715e2aeb88d31c8c806da7e447b41

    • SHA512

      fec573d2b453086f2ed0b8b11824e4626fb3712134a707f100b9b2704c489fffc1259646979b0c7ebeb032421163b35beed13d2772ac02a7dd08bf7723821805

    • SSDEEP

      12288:WwFGHEXEzFGj9F5qx5DJlm2HlzYmdMylgimtdYM3O0V7bbJ:W5HEXl9y1lrz7lgZtub0V7B

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks