General

  • Target

    7bda5add0d4ba2c5b1810e9f44a6c6fb

  • Size

    1017KB

  • Sample

    240128-cdd4raagcp

  • MD5

    7bda5add0d4ba2c5b1810e9f44a6c6fb

  • SHA1

    857ec2f81068823ea37da355fa8fef8396230eac

  • SHA256

    ddfa7fe7c01cfa34c2413acc83e9f11eace8bc09e80128da2b5e2e61284df9ff

  • SHA512

    f39060cc82a5d3ad738ca362406494fd1c7fdb7bc352c67a3f9f77cdc13a4f74a5464f1f226f9f08ecf75f9358955e28c2199bd676d8b99ad1b9b760b63435ce

  • SSDEEP

    12288:5SUkOyTh0sQQ3XFkdhhgxw56hHb4ApqblAOnGh:5lrRLQnOJgsKMAAxG

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.northsrockusa.com/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    (P%T2swlhOf}

Targets

    • Target

      7bda5add0d4ba2c5b1810e9f44a6c6fb

    • Size

      1017KB

    • MD5

      7bda5add0d4ba2c5b1810e9f44a6c6fb

    • SHA1

      857ec2f81068823ea37da355fa8fef8396230eac

    • SHA256

      ddfa7fe7c01cfa34c2413acc83e9f11eace8bc09e80128da2b5e2e61284df9ff

    • SHA512

      f39060cc82a5d3ad738ca362406494fd1c7fdb7bc352c67a3f9f77cdc13a4f74a5464f1f226f9f08ecf75f9358955e28c2199bd676d8b99ad1b9b760b63435ce

    • SSDEEP

      12288:5SUkOyTh0sQQ3XFkdhhgxw56hHb4ApqblAOnGh:5lrRLQnOJgsKMAAxG

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks