General

  • Target

    CHEMICAL SPECIFICATIONS.exe

  • Size

    1.0MB

  • Sample

    240426-jy57ascc7t

  • MD5

    f564f9251bd76e796906aebb35ae478a

  • SHA1

    e6b87808a2a2b26bcda776e971e442598402b2bd

  • SHA256

    386af47105d3e905ab5c1327fa634dd38e8af6d29f380cfbf0546549734d22f9

  • SHA512

    c979305cd640afe04056d36e327acee49d4c0fa9af77cd7ec9fa6463e7b0c145400be854deda5f8739956cdd95e3bceb44306d16f899487aee53e056f7144308

  • SSDEEP

    24576:9wzV9w070Ln2qfI3F2IJ0mxhyEtWj9gBrZkpsZIjd4bnFdtJB:wV8n2q02IdnyPg1ZyGIjd4bFdtJB

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.ercolina-usa.com
  • Port:
    21
  • Username:
    info@ercolina-usa.com
  • Password:
    1.$.#t~cK;4C

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.ercolina-usa.com
  • Port:
    21
  • Username:
    info@ercolina-usa.com
  • Password:
    1.$.#t~cK;4C

Targets

    • Target

      CHEMICAL SPECIFICATIONS.exe

    • Size

      1.0MB

    • MD5

      f564f9251bd76e796906aebb35ae478a

    • SHA1

      e6b87808a2a2b26bcda776e971e442598402b2bd

    • SHA256

      386af47105d3e905ab5c1327fa634dd38e8af6d29f380cfbf0546549734d22f9

    • SHA512

      c979305cd640afe04056d36e327acee49d4c0fa9af77cd7ec9fa6463e7b0c145400be854deda5f8739956cdd95e3bceb44306d16f899487aee53e056f7144308

    • SSDEEP

      24576:9wzV9w070Ln2qfI3F2IJ0mxhyEtWj9gBrZkpsZIjd4bnFdtJB:wV8n2q02IdnyPg1ZyGIjd4bFdtJB

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks