General

  • Target

    MalwareBazaar.3

  • Size

    2.3MB

  • Sample

    240806-grnbssvgng

  • MD5

    cb4c06029f3a62fbe5d928713a62ff0d

  • SHA1

    0fdd288756067341e012cfa98d332b51276f27c4

  • SHA256

    e8833753c577fada3bfb782a806fe4416a72ac905b6b00087bf48f3df8c3757e

  • SHA512

    2d629937f77f534791cf3ad6505a8fd07c307e47af99f91a837b24186a49adbf7012ca08fe5d9ca903074a1bd14020b2cb59b8aab05b37cfe6aa01568f483e83

  • SSDEEP

    49152:aWiP0wV0hJ5VGx6ODJ1+MEtWX33oG1Sd+oJCIXke4:UVUczabQf

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://cash4cars.nz
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    -[([pqM~nGA4

Targets

    • Target

      MalwareBazaar.3

    • Size

      2.3MB

    • MD5

      cb4c06029f3a62fbe5d928713a62ff0d

    • SHA1

      0fdd288756067341e012cfa98d332b51276f27c4

    • SHA256

      e8833753c577fada3bfb782a806fe4416a72ac905b6b00087bf48f3df8c3757e

    • SHA512

      2d629937f77f534791cf3ad6505a8fd07c307e47af99f91a837b24186a49adbf7012ca08fe5d9ca903074a1bd14020b2cb59b8aab05b37cfe6aa01568f483e83

    • SSDEEP

      49152:aWiP0wV0hJ5VGx6ODJ1+MEtWX33oG1Sd+oJCIXke4:UVUczabQf

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks