General

  • Target

    b8e762cb476f275f788c3b8db49cd3ef3e6fbb3c8d62596a8ccc56f1bc3c54a3.xlsx

  • Size

    589KB

  • Sample

    240907-b3hmssyfnf

  • MD5

    9fe19f03b1390e3e5cb002ecccb1b640

  • SHA1

    1cb49826edf0ea2ae0812849bceaeddea85e341f

  • SHA256

    b8e762cb476f275f788c3b8db49cd3ef3e6fbb3c8d62596a8ccc56f1bc3c54a3

  • SHA512

    7f5b11ae09a251bab33687f2801ba7fd296cdf643755e52bf5df04d9c1487cf5be671341709b92fb811f361874a9c281a17a6ddac604ee5307f0c1d2c11a6c03

  • SSDEEP

    12288:N90ZXxjZrLKswQMZXyil/4ofwXWMLFFfeaXxX4K6vj:QZXrKOM8ilnOWUFfFB4K6vj

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.stingatoareincendii.ro
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    3.*RYhlG)lkA

Targets

    • Target

      b8e762cb476f275f788c3b8db49cd3ef3e6fbb3c8d62596a8ccc56f1bc3c54a3.xlsx

    • Size

      589KB

    • MD5

      9fe19f03b1390e3e5cb002ecccb1b640

    • SHA1

      1cb49826edf0ea2ae0812849bceaeddea85e341f

    • SHA256

      b8e762cb476f275f788c3b8db49cd3ef3e6fbb3c8d62596a8ccc56f1bc3c54a3

    • SHA512

      7f5b11ae09a251bab33687f2801ba7fd296cdf643755e52bf5df04d9c1487cf5be671341709b92fb811f361874a9c281a17a6ddac604ee5307f0c1d2c11a6c03

    • SSDEEP

      12288:N90ZXxjZrLKswQMZXyil/4ofwXWMLFFfeaXxX4K6vj:QZXrKOM8ilnOWUFfFB4K6vj

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks