General

  • Target

    a1c90612e171679cdf3fc4aad3872a80a782e2cfee64b53a631cea435e947a81

  • Size

    775KB

  • Sample

    240425-c2klfadf99

  • MD5

    324796af926f8e32ccecd40e77676a0c

  • SHA1

    fa0bbffc6422f42395a323b49cc4752c5553c635

  • SHA256

    a1c90612e171679cdf3fc4aad3872a80a782e2cfee64b53a631cea435e947a81

  • SHA512

    35ad6f8612dd7a988ec7588eeae2e00c52a39ab5e5cf305f2de451bc531d479634da04e5442f88077801425ebdfa62d0a7f9977d11a1a54b5e75ba9104f7ac0a

  • SSDEEP

    24576:IF197Eaz2h/PVI+Jiu/CNchPJ312ZUY5:O77Eaz2lVI+JZCNKJl2j

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://eu-west-1.sftpcloud.io
  • Port:
    21
  • Username:
    64c972c69bef4d24b6a8140c66c10f0a
  • Password:
    2S39TYnNmuLXjVyhLq8dhVRX7Wul6UwJ

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    eu-west-1.sftpcloud.io
  • Port:
    21
  • Username:
    64c972c69bef4d24b6a8140c66c10f0a
  • Password:
    2S39TYnNmuLXjVyhLq8dhVRX7Wul6UwJ

Targets

    • Target

      a1c90612e171679cdf3fc4aad3872a80a782e2cfee64b53a631cea435e947a81

    • Size

      775KB

    • MD5

      324796af926f8e32ccecd40e77676a0c

    • SHA1

      fa0bbffc6422f42395a323b49cc4752c5553c635

    • SHA256

      a1c90612e171679cdf3fc4aad3872a80a782e2cfee64b53a631cea435e947a81

    • SHA512

      35ad6f8612dd7a988ec7588eeae2e00c52a39ab5e5cf305f2de451bc531d479634da04e5442f88077801425ebdfa62d0a7f9977d11a1a54b5e75ba9104f7ac0a

    • SSDEEP

      24576:IF197Eaz2h/PVI+Jiu/CNchPJ312ZUY5:O77Eaz2lVI+JZCNKJl2j

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks