General

  • Target

    4b1f40950e46411177a5328d583ec43c87e76804e7c40d659d907aaad15dedb2

  • Size

    531KB

  • Sample

    240728-bfm9rsyfmp

  • MD5

    edc1f5bc842a10d9e3c961a6b3ea316b

  • SHA1

    93e825ab954bdbe8bae666c7c20c8c38986fcee3

  • SHA256

    4b1f40950e46411177a5328d583ec43c87e76804e7c40d659d907aaad15dedb2

  • SHA512

    a20d0a4e5022f31401d2f30d5304790c1c54aa61354e137c2d1f97540c5711ec5d06e0beb7c5fc4849931c58ac74ea074d8ba5dc82887867d5b182b8cb665095

  • SSDEEP

    12288:yYV6MorX7qzuC3QHO9FQVHPF51jgcgGKR0BOMEagNM2zDc:BBXu9HGaVHzK00uePc

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.antoniomayol.com:21
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    cMhKDQUk1{;%

Targets

    • Target

      4b1f40950e46411177a5328d583ec43c87e76804e7c40d659d907aaad15dedb2

    • Size

      531KB

    • MD5

      edc1f5bc842a10d9e3c961a6b3ea316b

    • SHA1

      93e825ab954bdbe8bae666c7c20c8c38986fcee3

    • SHA256

      4b1f40950e46411177a5328d583ec43c87e76804e7c40d659d907aaad15dedb2

    • SHA512

      a20d0a4e5022f31401d2f30d5304790c1c54aa61354e137c2d1f97540c5711ec5d06e0beb7c5fc4849931c58ac74ea074d8ba5dc82887867d5b182b8cb665095

    • SSDEEP

      12288:yYV6MorX7qzuC3QHO9FQVHPF51jgcgGKR0BOMEagNM2zDc:BBXu9HGaVHzK00uePc

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks