General

  • Target

    4f8d7aa14593782e3f7ce667f4be630b251f7ff51b2c16b029f4bd977d9db65cN

  • Size

    1.1MB

  • Sample

    241016-l9377avarh

  • MD5

    fc71b1d111decdffd64086b63b2c7e90

  • SHA1

    d670287c6d79e09d3089579df7b174045ac3e02f

  • SHA256

    4f8d7aa14593782e3f7ce667f4be630b251f7ff51b2c16b029f4bd977d9db65c

  • SHA512

    37abc041dc0cb6fe72ea97bec9a8c6c83e07e990b001f8af55d779561de31a9210a5a95691dc2c5e3f842003e6d3ff42bbde9e13d2de04ccaf6a0c34368adf32

  • SSDEEP

    24576:ffmMv6Ckr7Mny5QLVBFb4nxToeTRwYo2Qo7jgjXp:f3v+7/5QLVzbgTDeYFQ5zp

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.jeepcommerce.rs
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    UL^Y]#$dMj?2

Targets

    • Target

      4f8d7aa14593782e3f7ce667f4be630b251f7ff51b2c16b029f4bd977d9db65cN

    • Size

      1.1MB

    • MD5

      fc71b1d111decdffd64086b63b2c7e90

    • SHA1

      d670287c6d79e09d3089579df7b174045ac3e02f

    • SHA256

      4f8d7aa14593782e3f7ce667f4be630b251f7ff51b2c16b029f4bd977d9db65c

    • SHA512

      37abc041dc0cb6fe72ea97bec9a8c6c83e07e990b001f8af55d779561de31a9210a5a95691dc2c5e3f842003e6d3ff42bbde9e13d2de04ccaf6a0c34368adf32

    • SSDEEP

      24576:ffmMv6Ckr7Mny5QLVBFb4nxToeTRwYo2Qo7jgjXp:f3v+7/5QLVzbgTDeYFQ5zp

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks