General

  • Target

    1.exe

  • Size

    29KB

  • Sample

    240926-kb6d8axann

  • MD5

    a016634929c4d57cc24719723a4cd65c

  • SHA1

    91e7492b6d3e543f185c69846bd175a626a931f5

  • SHA256

    182b161a951229364aef6e16d358beb00f285c9f146053471ad22e714eefa719

  • SHA512

    5f36c1ad444af94dfd4ca1d4aef188049ffdcf2a336f58cfeead5a55176e580312d3944c229ed8b66cc852f0a4c86b711603ea34ff80ebf1df6a3f84d61a695a

  • SSDEEP

    384:ANepKdJNF1oPvlsBrrFj95okNTvsYxksSvk0HFs0ZILHwz7A8iq8ziXuF:AcQ9F1oaBj95FkYmsScKZHGJt

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.alternatifplastik.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Fineboy777@

Targets

    • Target

      1.exe

    • Size

      29KB

    • MD5

      a016634929c4d57cc24719723a4cd65c

    • SHA1

      91e7492b6d3e543f185c69846bd175a626a931f5

    • SHA256

      182b161a951229364aef6e16d358beb00f285c9f146053471ad22e714eefa719

    • SHA512

      5f36c1ad444af94dfd4ca1d4aef188049ffdcf2a336f58cfeead5a55176e580312d3944c229ed8b66cc852f0a4c86b711603ea34ff80ebf1df6a3f84d61a695a

    • SSDEEP

      384:ANepKdJNF1oPvlsBrrFj95okNTvsYxksSvk0HFs0ZILHwz7A8iq8ziXuF:AcQ9F1oaBj95FkYmsScKZHGJt

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks