General

  • Target

    FAC7678900098900.exe

  • Size

    587KB

  • Sample

    241115-m149kawrck

  • MD5

    433aa4cfbc516d24d7b4818467cec6b7

  • SHA1

    2696c77aaba9cdcfdd7e9a7cf2733caec38951be

  • SHA256

    e8b20b02dc4e411270f43d32a5e0a66cccf33aaa7fe971a6426e1fc2815f120c

  • SHA512

    07bd34c3578b9dcf8b7810fec330759b1d24437ca4b9bfa070a48793c22e5b2b71ed360275505c2e69c3c0cf006042324c6410adc7399792da39a68a9ec96dee

  • SSDEEP

    12288:gOv5jKhsfoPA+yeVKUCUxP4C902bdRtJJPixqXsOda1oGR3+tVglH2Cql07+Lx:gq5TfcdHj4fmbjXdaLOrg7qy7gx

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.antoniomayol.com:21
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    cMhKDQUk1{;%

Targets

    • Target

      FAC7678900098900.exe

    • Size

      587KB

    • MD5

      433aa4cfbc516d24d7b4818467cec6b7

    • SHA1

      2696c77aaba9cdcfdd7e9a7cf2733caec38951be

    • SHA256

      e8b20b02dc4e411270f43d32a5e0a66cccf33aaa7fe971a6426e1fc2815f120c

    • SHA512

      07bd34c3578b9dcf8b7810fec330759b1d24437ca4b9bfa070a48793c22e5b2b71ed360275505c2e69c3c0cf006042324c6410adc7399792da39a68a9ec96dee

    • SSDEEP

      12288:gOv5jKhsfoPA+yeVKUCUxP4C902bdRtJJPixqXsOda1oGR3+tVglH2Cql07+Lx:gq5TfcdHj4fmbjXdaLOrg7qy7gx

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks