General

  • Target

    9a7b2c003560246eaa7b662ac648d17475ab2e7e057d7bd063c25e2f8ab21dc9

  • Size

    2.4MB

  • Sample

    241119-bm61fsyhmq

  • MD5

    5c5c14c126f1bcd80102411e2d6c56de

  • SHA1

    6e70364bed5f832016f27f9ece3a507350365362

  • SHA256

    9a7b2c003560246eaa7b662ac648d17475ab2e7e057d7bd063c25e2f8ab21dc9

  • SHA512

    016fa29bd74c25049effddd4c653cd5afb479932ffcf71c668bda6c8b90c855fc4837985a74ddada01d1b8c7c5f2ef05044ccc72eef3a1dd35a28df2ffd7f962

  • SSDEEP

    24576:2aHUFbWM9o9vmPtacnyKrEV6Q1IHOLclQkYtSsYEA5PIUxhFSvsTZj8dwBh5rDzH:2eTLc+Yh5vlO2ZjqwwWqEctE6vrltZn

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.svetigeorgije.co.rs
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    4c5H&b2whkD9

Targets

    • Target

      9a7b2c003560246eaa7b662ac648d17475ab2e7e057d7bd063c25e2f8ab21dc9

    • Size

      2.4MB

    • MD5

      5c5c14c126f1bcd80102411e2d6c56de

    • SHA1

      6e70364bed5f832016f27f9ece3a507350365362

    • SHA256

      9a7b2c003560246eaa7b662ac648d17475ab2e7e057d7bd063c25e2f8ab21dc9

    • SHA512

      016fa29bd74c25049effddd4c653cd5afb479932ffcf71c668bda6c8b90c855fc4837985a74ddada01d1b8c7c5f2ef05044ccc72eef3a1dd35a28df2ffd7f962

    • SSDEEP

      24576:2aHUFbWM9o9vmPtacnyKrEV6Q1IHOLclQkYtSsYEA5PIUxhFSvsTZj8dwBh5rDzH:2eTLc+Yh5vlO2ZjqwwWqEctE6vrltZn

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks