General

  • Target

    f9c2e69fd14b609d162834f2aa90ea0dfffc1a8b46b07f683e91b4c094d60022

  • Size

    714KB

  • Sample

    240314-cmt7bsga6z

  • MD5

    e152f45fc44509ba5b06c5e9947db045

  • SHA1

    ae21e818538dff3462f57d25bef40d08507cb923

  • SHA256

    f9c2e69fd14b609d162834f2aa90ea0dfffc1a8b46b07f683e91b4c094d60022

  • SHA512

    9f160e82996e22dfe241c37428b97a81cb2072a34be38746dffdbc5a49da461f0e48310935548e2c979eda3e2aec4364d2559b3cee6cddf84447afc751ad0b80

  • SSDEEP

    12288:YHwgk26OZDx/OSL9igx26Ifj6iubmMIc+MjbHSnhsRMUIFFTdr:4/VWYhsb6ifyvjGhsCFT

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.jeepcommerce.rs
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    UL^Y]#$dMj?2

Targets

    • Target

      f9c2e69fd14b609d162834f2aa90ea0dfffc1a8b46b07f683e91b4c094d60022

    • Size

      714KB

    • MD5

      e152f45fc44509ba5b06c5e9947db045

    • SHA1

      ae21e818538dff3462f57d25bef40d08507cb923

    • SHA256

      f9c2e69fd14b609d162834f2aa90ea0dfffc1a8b46b07f683e91b4c094d60022

    • SHA512

      9f160e82996e22dfe241c37428b97a81cb2072a34be38746dffdbc5a49da461f0e48310935548e2c979eda3e2aec4364d2559b3cee6cddf84447afc751ad0b80

    • SSDEEP

      12288:YHwgk26OZDx/OSL9igx26Ifj6iubmMIc+MjbHSnhsRMUIFFTdr:4/VWYhsb6ifyvjGhsCFT

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks