General

  • Target

    6985c547dbcc5e300dbee760b4223ad90551209f13407b995d7cf9c5de63dde0

  • Size

    595KB

  • Sample

    240327-cb3z4acg6t

  • MD5

    08cbae6cd7352b0645795c773a755541

  • SHA1

    60a6e19a98cbe8b926e11c9300c6783a5c5592b8

  • SHA256

    6985c547dbcc5e300dbee760b4223ad90551209f13407b995d7cf9c5de63dde0

  • SHA512

    a7f5109ad7362c26e47f5d61c3b169b51911ff262278abc0523100bd88b63f34136aeddb42cf59fb5351423be94e731fce35b3ac74850d4bc78d9511b7a1a8b5

  • SSDEEP

    12288:nvX7m3mfWTmHftxqmtgGL0zIc7EXptMpksYUdZLmlyzn0lSzFmEki:nvX7omfTcS9wEXpWimZLmlyz0luP

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.brokerswoodinc.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Xpen2000

Targets

    • Target

      6985c547dbcc5e300dbee760b4223ad90551209f13407b995d7cf9c5de63dde0

    • Size

      595KB

    • MD5

      08cbae6cd7352b0645795c773a755541

    • SHA1

      60a6e19a98cbe8b926e11c9300c6783a5c5592b8

    • SHA256

      6985c547dbcc5e300dbee760b4223ad90551209f13407b995d7cf9c5de63dde0

    • SHA512

      a7f5109ad7362c26e47f5d61c3b169b51911ff262278abc0523100bd88b63f34136aeddb42cf59fb5351423be94e731fce35b3ac74850d4bc78d9511b7a1a8b5

    • SSDEEP

      12288:nvX7m3mfWTmHftxqmtgGL0zIc7EXptMpksYUdZLmlyzn0lSzFmEki:nvX7omfTcS9wEXpWimZLmlyz0luP

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks