General

  • Target

    f7fb8b6e095481be00834aafa1bc60d64e3d781e857c4c9f5b27dea5953d6ad4

  • Size

    715KB

  • Sample

    240710-bh891syfqa

  • MD5

    262c763d29cb99067ba572d67490da5c

  • SHA1

    9fdb5e15406d71e7c5b1cf029d5f0341f3d2dcfa

  • SHA256

    f7fb8b6e095481be00834aafa1bc60d64e3d781e857c4c9f5b27dea5953d6ad4

  • SHA512

    f944fc648cd7d5f3c9f10c2857d1925244774ce38f929a9845f093d75854e2e539aeb3b1353a9d0cf58487d3f21d8b76626bfa444ed280c41efadf11e4418889

  • SSDEEP

    12288:5O8pzFSkhgY9eNAH0LpcRpX5Ig3YkZVFGiREpdWqP9jC7dW/oWjfhLzVEy:ZFSkmrKc+fX5lRLREDlu7IQUhz

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.antoniomayol.com:21
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    cMhKDQUk1{;%

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.antoniomayol.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    cMhKDQUk1{;%

Targets

    • Target

      DSFRT987600000.exe

    • Size

      812KB

    • MD5

      ca698d84fc93036b8e8269a173380448

    • SHA1

      233c29bb87c7ee1d252854dc90a8dbbf9f6e5d76

    • SHA256

      6a31f54219ee0ddbfcb2aa841f922d48a849b1b047b8693ff8c2faad2ab8fac4

    • SHA512

      e1cd052c2d442437eab1fd57d5b357c915669f18d5b4cc04bc49543301990f2bb955673c4ef97e746e7b2cab9faa9ac10930043918a8c1a420141de989427bec

    • SSDEEP

      24576:WTCBK8jt7SS2KlHSSpKycXXb7xJFIun8LuUWPLy:WslXKp7nd8iJLy

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks