General

  • Target

    46044e8e01547f2456e27e8b15c667f004a2c26fd647f3cecc71de19015d96c0.exe

  • Size

    953KB

  • Sample

    241009-bwdehayejp

  • MD5

    b77b84072a85329568ea006b1b7f4201

  • SHA1

    d9b623c149eeabf151684d852b7d0ab431712c42

  • SHA256

    46044e8e01547f2456e27e8b15c667f004a2c26fd647f3cecc71de19015d96c0

  • SHA512

    f4c27771129cab42b97799103f22eb75bcc000394a7710d7be0c0ff62ca08bebceeccd01d07187d2b18a8e5934b3650aefc3f808697aec3625c66acf59acfb2c

  • SSDEEP

    6144:y3RGg96TatCqrplgjl2xrkGBiTqmqFOrX1SQLYhyb/H3SY34J/JssbACSWTYXPS8:CRGgZLr0JQiTqmqgX1fGDQeTsAiL

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.alternatifplastik.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Fineboy777@

Targets

    • Target

      46044e8e01547f2456e27e8b15c667f004a2c26fd647f3cecc71de19015d96c0.exe

    • Size

      953KB

    • MD5

      b77b84072a85329568ea006b1b7f4201

    • SHA1

      d9b623c149eeabf151684d852b7d0ab431712c42

    • SHA256

      46044e8e01547f2456e27e8b15c667f004a2c26fd647f3cecc71de19015d96c0

    • SHA512

      f4c27771129cab42b97799103f22eb75bcc000394a7710d7be0c0ff62ca08bebceeccd01d07187d2b18a8e5934b3650aefc3f808697aec3625c66acf59acfb2c

    • SSDEEP

      6144:y3RGg96TatCqrplgjl2xrkGBiTqmqFOrX1SQLYhyb/H3SY34J/JssbACSWTYXPS8:CRGgZLr0JQiTqmqgX1fGDQeTsAiL

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks