General

  • Target

    d25f1495eee9c05e29e18fbd62f932f0f670cb441b30ac99ced1a80e14275b80.exe

  • Size

    1.2MB

  • Sample

    240830-cq22casdne

  • MD5

    3611914350f1ddaa7cf7573267f7fc91

  • SHA1

    2be994ddb06abdd9f6f74955af41001d8412f9e8

  • SHA256

    d25f1495eee9c05e29e18fbd62f932f0f670cb441b30ac99ced1a80e14275b80

  • SHA512

    5b8409876366fa11857a37114fcb39bf49eaf8f688cd3ab05f733e421a6788399d6e96c18510b9c3ca3a0bb20b55473b3179b0d92827de4cc081d38a2372c1b7

  • SSDEEP

    24576:aqDEvCTbMWu7rQYlBQcBiT6rprG8aYXuNKbdz0p:aTvC/MTQYxsWR7aYeNKZ0

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.fosna.net
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    (=8fPSH$KO_!

Targets

    • Target

      d25f1495eee9c05e29e18fbd62f932f0f670cb441b30ac99ced1a80e14275b80.exe

    • Size

      1.2MB

    • MD5

      3611914350f1ddaa7cf7573267f7fc91

    • SHA1

      2be994ddb06abdd9f6f74955af41001d8412f9e8

    • SHA256

      d25f1495eee9c05e29e18fbd62f932f0f670cb441b30ac99ced1a80e14275b80

    • SHA512

      5b8409876366fa11857a37114fcb39bf49eaf8f688cd3ab05f733e421a6788399d6e96c18510b9c3ca3a0bb20b55473b3179b0d92827de4cc081d38a2372c1b7

    • SSDEEP

      24576:aqDEvCTbMWu7rQYlBQcBiT6rprG8aYXuNKbdz0p:aTvC/MTQYxsWR7aYeNKZ0

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks