General

  • Target

    61c746b5ea4e7c67cb05e2ba0673807698da7eaed31023a8a13163ba27d8c547.exe

  • Size

    637KB

  • Sample

    240821-me5cfawhqm

  • MD5

    b860477bafb4d00f95496882d8d32fb8

  • SHA1

    e96dbcff3deab2fa47dda3b2b5698d44ce49d421

  • SHA256

    61c746b5ea4e7c67cb05e2ba0673807698da7eaed31023a8a13163ba27d8c547

  • SHA512

    f34851034ee5c7a2722436bf3babca249442ca6b10a28f21616fb6e3657bdf76efc6625869e6decd3973be1f0385a6610dee93224d2dcfc0175b4fc9b733ebe3

  • SSDEEP

    12288:UsHzOUNUSB/o5LsI1uwajJ5yvv1l2ajHbHo/5J/LraRjLhiqFtSwe:3iUmSB/o5d1ubcvh3Hy5JDmR3Ewe

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.fosna.net
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    (=8fPSH$KO_!

Targets

    • Target

      61c746b5ea4e7c67cb05e2ba0673807698da7eaed31023a8a13163ba27d8c547.exe

    • Size

      637KB

    • MD5

      b860477bafb4d00f95496882d8d32fb8

    • SHA1

      e96dbcff3deab2fa47dda3b2b5698d44ce49d421

    • SHA256

      61c746b5ea4e7c67cb05e2ba0673807698da7eaed31023a8a13163ba27d8c547

    • SHA512

      f34851034ee5c7a2722436bf3babca249442ca6b10a28f21616fb6e3657bdf76efc6625869e6decd3973be1f0385a6610dee93224d2dcfc0175b4fc9b733ebe3

    • SSDEEP

      12288:UsHzOUNUSB/o5LsI1uwajJ5yvv1l2ajHbHo/5J/LraRjLhiqFtSwe:3iUmSB/o5d1ubcvh3Hy5JDmR3Ewe

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks