General

  • Target

    d96d65aab0e55fb6e3d470c7dc58c8c6e687c81df626b60c7461c9349734d240.exe

  • Size

    2.8MB

  • Sample

    241008-ct7e8sybkd

  • MD5

    68b39ced0840d43e3a03e2f92c268c72

  • SHA1

    9dfb2ce520e0df7000d2c2a05a012d4446904480

  • SHA256

    d96d65aab0e55fb6e3d470c7dc58c8c6e687c81df626b60c7461c9349734d240

  • SHA512

    6dd61a3e004e75b213b305d62c23189bd7bebed23a390bbd15aa65e2a2c9b3a23c1fff14ba0947d8650af2a76972b4920208d7763c15919406be41be52e32958

  • SSDEEP

    24576:pcid/6VwqvqxO7eeuDy/3gQovH9k+wMANi2Cc0QTDy22k/X37DNO7w6qIGigNKpM:v6owTwRSJXMdSbIl9Lo5qGnzQ9g

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.alternatifplastik.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Fineboy777@

Targets

    • Target

      d96d65aab0e55fb6e3d470c7dc58c8c6e687c81df626b60c7461c9349734d240.exe

    • Size

      2.8MB

    • MD5

      68b39ced0840d43e3a03e2f92c268c72

    • SHA1

      9dfb2ce520e0df7000d2c2a05a012d4446904480

    • SHA256

      d96d65aab0e55fb6e3d470c7dc58c8c6e687c81df626b60c7461c9349734d240

    • SHA512

      6dd61a3e004e75b213b305d62c23189bd7bebed23a390bbd15aa65e2a2c9b3a23c1fff14ba0947d8650af2a76972b4920208d7763c15919406be41be52e32958

    • SSDEEP

      24576:pcid/6VwqvqxO7eeuDy/3gQovH9k+wMANi2Cc0QTDy22k/X37DNO7w6qIGigNKpM:v6owTwRSJXMdSbIl9Lo5qGnzQ9g

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks