General

  • Target

    f79552d4cb2e41bf92bd82d7ce67e7d9765963e845961065b192db8867b326f6

  • Size

    581KB

  • Sample

    241121-bfcg9s1rfq

  • MD5

    93601ad2d3c9a4cc18d33ca1fb5cfa87

  • SHA1

    5ebbff3faab392446ac7cbb431df12ef321546f6

  • SHA256

    f79552d4cb2e41bf92bd82d7ce67e7d9765963e845961065b192db8867b326f6

  • SHA512

    3fcb6c85a64cdff47c3e4cdf3d760c3046e43d5133e15c9f856d6da018f702037d2bfc68e12f2ae85689a9a8d7202ec2782cb82c7dd519a0e33bf9de0df9d3c1

  • SSDEEP

    12288:MCyQbV3V4usbDf0QlFOukO+S3hutphjdbpfijy9eu0Y/DJGn/CvwPtxBIOr:MCyOEu9QlFb/+hBjdbl0Y/DJG/2iqi

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.stingatoareincendii.ro
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    3.*RYhlG)lkA

Targets

    • Target

      OC DDLP - 241119L2.exe

    • Size

      1.1MB

    • MD5

      07f3589cb703b42918c9aada57a6e6c3

    • SHA1

      65a45025555d388f84c79dbcbecfd79b07a1045d

    • SHA256

      0bba9e74459f8350ce9b8da6cb42f8bb006609aedf4f07ec340d07110fb86fb9

    • SHA512

      7db82a52efd55ba4a6906d170fccfa1ad8300632c587f45ce557721c04946fc6793b4e987f67eec57182da15cc28286d9a28713c6294ab786e523f619c318096

    • SSDEEP

      24576:Ftb20pkaCqT5TBWgNQ7aH6//F9nc0+d36A:2Vg5tQ7aa//F9ncdt5

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks