General

  • Target

    6eeaf8af1f0d3a3224145b3488a7706811a5b63f9bb1ea151d2812938e62e47b

  • Size

    13KB

  • Sample

    240313-cj475ahg8w

  • MD5

    ca6a3132d14c0f0cb5afa8471577c947

  • SHA1

    e624d369034fc4a138ff804de6b60af12f745f51

  • SHA256

    6eeaf8af1f0d3a3224145b3488a7706811a5b63f9bb1ea151d2812938e62e47b

  • SHA512

    0cba9f7d1937a19de98896fd249e933a0b18f5fa789c19b682f74152185b7d7e4d2faa01745803a4ff883a5cf58947228bea893711f9d94c675ee003452b2da2

  • SSDEEP

    384:e7ixa8f/xlKJyKFVfvVzdivEsVgN/sQ8VgNFsQJMzMSbp3SLC7K/UB6Vd+mVu7pY:YVolxA0Q9glfGFD3hAf2mmVDUToocJ

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.stingatoareincendii.ro
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Q-1HmWsBJgRe

Targets

    • Target

      6eeaf8af1f0d3a3224145b3488a7706811a5b63f9bb1ea151d2812938e62e47b

    • Size

      13KB

    • MD5

      ca6a3132d14c0f0cb5afa8471577c947

    • SHA1

      e624d369034fc4a138ff804de6b60af12f745f51

    • SHA256

      6eeaf8af1f0d3a3224145b3488a7706811a5b63f9bb1ea151d2812938e62e47b

    • SHA512

      0cba9f7d1937a19de98896fd249e933a0b18f5fa789c19b682f74152185b7d7e4d2faa01745803a4ff883a5cf58947228bea893711f9d94c675ee003452b2da2

    • SSDEEP

      384:e7ixa8f/xlKJyKFVfvVzdivEsVgN/sQ8VgNFsQJMzMSbp3SLC7K/UB6Vd+mVu7pY:YVolxA0Q9glfGFD3hAf2mmVDUToocJ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks