General

  • Target

    19583c90a98e9be4b999d0cce3a446830402d1d15a1f729b7949a0164eb8d8d3

  • Size

    1.3MB

  • Sample

    240521-b5l31aeb54

  • MD5

    51d90ede9878b321300fb8a4acaae864

  • SHA1

    909fe7c3274a51cd70e33ed537ab51dbc0b26c27

  • SHA256

    19583c90a98e9be4b999d0cce3a446830402d1d15a1f729b7949a0164eb8d8d3

  • SHA512

    22315eb9b03f7bee536224a23965d0e9b3feacb3a7e405a5d21975e727f0730cdaa6ead1ef9469023c64a8e031e40e63fd011595c1d363b82e09bf2260fce50c

  • SSDEEP

    24576:uVT7rhCqd/N6qVlyug8IEv3hjXdlVD/HA:uKqd1xVl3IEvRVI

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.absorbante-calitate.ro
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    %)#m~ZLV4-$n

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.absorbante-calitate.ro
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    %)#m~ZLV4-$n

Targets

    • Target

      Order_001179820PDF.exe

    • Size

      1.2MB

    • MD5

      3fe55989e3813ee29f063b4f018836a1

    • SHA1

      541d5c97541dc9fb6d80fd3df54c45ef46d8fbf5

    • SHA256

      a720607ffa5644d67d0afa04b02a7a00ae7950080a9ad67cfbc31f5ad63b3f33

    • SHA512

      d1d051deec01a67e227892e3682e4cef50e44bc50fcc3876bab1745d6c06d4a765b92ad53a44f25e635be72742af9e366da4982f94d7ec2b35284fe4e61e8fb8

    • SSDEEP

      24576:uVT7rhCqd/N6qVlyug8IEv3hjXdlVD/HA:uKqd1xVl3IEvRVI

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks