General

  • Target

    1d789cde86d7ca676b8897c2de561e20f61bd9cdd708be9da7a2d9304df0ee02.exe

  • Size

    1.1MB

  • Sample

    241015-bhzetazdmn

  • MD5

    c2d989a867f925afc6940a7bad9aedee

  • SHA1

    111b0b6612f6a095815d5d73c85c703eacc39702

  • SHA256

    1d789cde86d7ca676b8897c2de561e20f61bd9cdd708be9da7a2d9304df0ee02

  • SHA512

    902b549b97f6e005386dfb29b0e31f29541a15c7ac8fcfb4ca1b05697be4084ddf705a4d9629df23804c1b254396576d3677d32728d71f67696eb67673b52d74

  • SSDEEP

    24576:WfmMv6Ckr7Mny5Q6SfQVZj/8gzyALrh+XyD7eV:W3v+7/5Q6SfQb84h+CD6

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.ercolina-usa.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    uy,o#mZj8$lY

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.ercolina-usa.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    uy,o#mZj8$lY

Targets

    • Target

      1d789cde86d7ca676b8897c2de561e20f61bd9cdd708be9da7a2d9304df0ee02.exe

    • Size

      1.1MB

    • MD5

      c2d989a867f925afc6940a7bad9aedee

    • SHA1

      111b0b6612f6a095815d5d73c85c703eacc39702

    • SHA256

      1d789cde86d7ca676b8897c2de561e20f61bd9cdd708be9da7a2d9304df0ee02

    • SHA512

      902b549b97f6e005386dfb29b0e31f29541a15c7ac8fcfb4ca1b05697be4084ddf705a4d9629df23804c1b254396576d3677d32728d71f67696eb67673b52d74

    • SSDEEP

      24576:WfmMv6Ckr7Mny5Q6SfQVZj/8gzyALrh+XyD7eV:W3v+7/5Q6SfQb84h+CD6

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks