General

  • Target

    b08051f505a5d20180d7af56dbd4a42f50f7b966422834bbf233b05975b04219

  • Size

    1.0MB

  • Sample

    240613-c4tbcsverr

  • MD5

    943159539503d80fcd8a12fbe4dbae0d

  • SHA1

    a9826e73a58dbf8e257f8434bde0eaca904d28a6

  • SHA256

    b08051f505a5d20180d7af56dbd4a42f50f7b966422834bbf233b05975b04219

  • SHA512

    3be2962a181231bbf8b17075ebb5d0b5159885dc103ee101ae5228b91207bb89dc99439a1d9a3f9efb2c0fa374c076bf2bbbbff098b41b0c19f79dd590f1f5ab

  • SSDEEP

    24576:aAHnh+eWsN3skA4RV1Hom2KXMmHaeBD42abqAW5:th+ZkldoPK8YaeGdE

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.antoniomayol.com:21
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    cMhKDQUk1{;%

Targets

    • Target

      b08051f505a5d20180d7af56dbd4a42f50f7b966422834bbf233b05975b04219

    • Size

      1.0MB

    • MD5

      943159539503d80fcd8a12fbe4dbae0d

    • SHA1

      a9826e73a58dbf8e257f8434bde0eaca904d28a6

    • SHA256

      b08051f505a5d20180d7af56dbd4a42f50f7b966422834bbf233b05975b04219

    • SHA512

      3be2962a181231bbf8b17075ebb5d0b5159885dc103ee101ae5228b91207bb89dc99439a1d9a3f9efb2c0fa374c076bf2bbbbff098b41b0c19f79dd590f1f5ab

    • SSDEEP

      24576:aAHnh+eWsN3skA4RV1Hom2KXMmHaeBD42abqAW5:th+ZkldoPK8YaeGdE

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks