General

  • Target

    0d450b54c9d69b73601a2f82fb0d41eac324b6efc1462401cce8be64080bec4c

  • Size

    6KB

  • Sample

    241120-bzag1sxmfx

  • MD5

    8e6b9581bb62de86eff64e173d6b2783

  • SHA1

    50ef6a10229230c3921a5367e2ff78bd6811713a

  • SHA256

    0d450b54c9d69b73601a2f82fb0d41eac324b6efc1462401cce8be64080bec4c

  • SHA512

    701dbe96d88c8c4e759d78aec3344b5aed785180539a5ec2ffaef0d64fbc7e8a0cc593aee5f1c64b307df5cdd73a7d143107b6bc8f681b0dc5aff1a32b9ead64

  • SSDEEP

    96:bo5v9wSZf13tOrR8aMaiVu+ZsR4dXwaMH+URzNt:0vN7MRziu+ZA4dAagpz

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.alternatifplastik.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Fineboy777@

Targets

    • Target

      0d450b54c9d69b73601a2f82fb0d41eac324b6efc1462401cce8be64080bec4c

    • Size

      6KB

    • MD5

      8e6b9581bb62de86eff64e173d6b2783

    • SHA1

      50ef6a10229230c3921a5367e2ff78bd6811713a

    • SHA256

      0d450b54c9d69b73601a2f82fb0d41eac324b6efc1462401cce8be64080bec4c

    • SHA512

      701dbe96d88c8c4e759d78aec3344b5aed785180539a5ec2ffaef0d64fbc7e8a0cc593aee5f1c64b307df5cdd73a7d143107b6bc8f681b0dc5aff1a32b9ead64

    • SSDEEP

      96:bo5v9wSZf13tOrR8aMaiVu+ZsR4dXwaMH+URzNt:0vN7MRziu+ZA4dAagpz

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks