General

  • Target

    474a19c1741d117b14db17ce939b6c0d32e6b1dff07f6accd386df737484753c

  • Size

    793KB

  • Sample

    240927-srhxvsydrk

  • MD5

    e3d8f3e16effe94ba64ef6f9a69531ba

  • SHA1

    8ecc3a50f77cee4cfb119fbc1b6ac926ccb99ead

  • SHA256

    474a19c1741d117b14db17ce939b6c0d32e6b1dff07f6accd386df737484753c

  • SHA512

    53b140169fb4bdb12b783402cb7b8009ede27878cc791fcd2f4b614a4a31fb8804e4b38a2b57e29cb9d6688528639e41078d0b7f2dc8c79b60b8677dd2644531

  • SSDEEP

    24576:nznRaMQS4AJc6+/Q1qpcLUMencFKDcGR0mw4KgU:nznR7jQxOZenR0mw4Kd

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.ercolina-usa.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    nXe0M~WkW&nJ

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.ercolina-usa.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    nXe0M~WkW&nJ

Targets

    • Target

      QUOTATIONS#08670.exe

    • Size

      1.2MB

    • MD5

      d7161989ed8189378bdabf98711afd2d

    • SHA1

      5564678d3f4c6be02c79762f6ff42d93b011c3b2

    • SHA256

      78af8e41027a1d90e32ebb240d9678217838737ddcda978ea711f9eaf8a283cf

    • SHA512

      162f5f93f4418327e8986f405fb2560de9d8a810e21214421868803fa5feaf70ee4aa93c7698e42bc46ab6af89add965e509f421088fbd2591093f158fd1c82a

    • SSDEEP

      24576:pRmJkcoQricOIQxiZY1iaQ3nNqU8inKUncVMb2Yzi/nm:mJZoQrbTFZY1iaQcgpnugr+nm

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks