General

  • Target

    Richardson Electronics, LTD. PRD10221301UUE.exe

  • Size

    6KB

  • Sample

    240927-razzdayblb

  • MD5

    a93062ea78a516e011dfd18d4c462c87

  • SHA1

    3ce876b96600c4d0252c73fa97c4ed0764b29503

  • SHA256

    3b799063aa6a0a79e4a160b4650dc3199ebe128d1a183de4591e03a0b29674f1

  • SHA512

    b8fb16d0ad87a7a17c461e38dae2ec6a9ce62811ae8dd64f4d69e235bd3252055c62985bf3a2f1b569f8930db881f13a795db8dee2856aeac282f1dc3eb37948

  • SSDEEP

    96:Ey0sGxi1iavaSmlsXmMHuptEknfR5M+8lpoFvbOElQouRzNt:vRZvaDa2eu/lffAoBbOcQlz

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.alternatifplastik.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Fineboy777@

Targets

    • Target

      Richardson Electronics, LTD. PRD10221301UUE.exe

    • Size

      6KB

    • MD5

      a93062ea78a516e011dfd18d4c462c87

    • SHA1

      3ce876b96600c4d0252c73fa97c4ed0764b29503

    • SHA256

      3b799063aa6a0a79e4a160b4650dc3199ebe128d1a183de4591e03a0b29674f1

    • SHA512

      b8fb16d0ad87a7a17c461e38dae2ec6a9ce62811ae8dd64f4d69e235bd3252055c62985bf3a2f1b569f8930db881f13a795db8dee2856aeac282f1dc3eb37948

    • SSDEEP

      96:Ey0sGxi1iavaSmlsXmMHuptEknfR5M+8lpoFvbOElQouRzNt:vRZvaDa2eu/lffAoBbOcQlz

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks