General

  • Target

    f290c0ba11cf19dd6f4950c9a5668c45.bin

  • Size

    664KB

  • Sample

    240907-cet7cszbjp

  • MD5

    d768ef0a97d0907af9d9aaf6c4cbaf7f

  • SHA1

    f73f196ea823dd4503efbc7c0c56c7a952eda362

  • SHA256

    689d6b6898f75987abba3cf92eeef4dd7130ed9393fcdcae15469fd838d9f32b

  • SHA512

    4760a9446c4b30eb6ee363f57619391dda30f6905524045bf1edfb31381cc19dedb1a67a8e3230af7b5db36917d7fbd51dede69d63879399a4b9018f242f77b8

  • SSDEEP

    12288:XYw0+qkvLOexKAGonpVNw/s/DF3/aUdiQouvBGp2cwBqJuhYg7Gzc:Xg+q8LOVAtnNwk/DFPaUdiTpuBqJumE

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.stingatoareincendii.ro
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    3.*RYhlG)lkA

Targets

    • Target

      0530d54b2b5991438af0651976bec3a26660b2df5f6e21669700f48c9e810df8.xlsx

    • Size

      665KB

    • MD5

      f290c0ba11cf19dd6f4950c9a5668c45

    • SHA1

      0c9889f0c02c53ecf67588d279d02ad948cf0d93

    • SHA256

      0530d54b2b5991438af0651976bec3a26660b2df5f6e21669700f48c9e810df8

    • SHA512

      03c1d493f0ccb6ad009fd2da765267f0754dd0e176147d65f5d0761e0f40f4843bdd764bdafee0519795f792a1e3866f85d73836b35424a531c174e53b6d38c9

    • SSDEEP

      12288:/aZJiMBVwRQDPIPz4hLlHSEl7ebLNSB38vzJJkubHOVEgJUSO:SrXjLxEbLNE387JJbHmEgi5

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks