General

  • Target

    400ebef069d04c104e379cb12ab8e9b90e4b4e82f8dae25754b5f25da51b0fa1

  • Size

    1.0MB

  • Sample

    241119-b2374stmbq

  • MD5

    363b960030ff1cf563b86b66aaed188a

  • SHA1

    e8569007578670e8c317968f1cbcc621df5c188c

  • SHA256

    400ebef069d04c104e379cb12ab8e9b90e4b4e82f8dae25754b5f25da51b0fa1

  • SHA512

    06940c3bcdf52228ad54a69e24703aa57d76012a9d8386bd17983ee14035eaf99402b797c23253de6fc8aa074b1c71a489106baabe601ed8bf2ecab1614f5781

  • SSDEEP

    24576:Btb20pkaCqT5TBWgNQ7aNJd0lr4dTIN46A:SVg5tQ7aNJd04z5

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.jeepcommerce.rs
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    s04.$S]nbXTq

Targets

    • Target

      400ebef069d04c104e379cb12ab8e9b90e4b4e82f8dae25754b5f25da51b0fa1

    • Size

      1.0MB

    • MD5

      363b960030ff1cf563b86b66aaed188a

    • SHA1

      e8569007578670e8c317968f1cbcc621df5c188c

    • SHA256

      400ebef069d04c104e379cb12ab8e9b90e4b4e82f8dae25754b5f25da51b0fa1

    • SHA512

      06940c3bcdf52228ad54a69e24703aa57d76012a9d8386bd17983ee14035eaf99402b797c23253de6fc8aa074b1c71a489106baabe601ed8bf2ecab1614f5781

    • SSDEEP

      24576:Btb20pkaCqT5TBWgNQ7aNJd0lr4dTIN46A:SVg5tQ7aNJd04z5

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks