General

  • Target

    f93fadb07a86ab75302290d70b2adb3bdbd55f48bd4357147436cb5f2466af58

  • Size

    590KB

  • Sample

    241211-bg1lgsxrfx

  • MD5

    cfb66dede0d51d76c805b3f7cbe0cc2f

  • SHA1

    c065d74285f3f64bec04eee435ad232a0308b7f7

  • SHA256

    f93fadb07a86ab75302290d70b2adb3bdbd55f48bd4357147436cb5f2466af58

  • SHA512

    59d6e42a22ab2132b9ca4fa48c0154a9ff5eaba0cc16aa97dc49c5704c4638f6d8aadfb653cc9be09f9f67d1712354cb06f1871d576b842356f817f2582e0713

  • SSDEEP

    12288:tEsmQb16JqG0QV5J+L7yPVMXexfCekA5200dbVqt/0R3obitKR2AYQ:rmQcf0L7yPVM3eu00dbO/0MOn9Q

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.ercolina-usa.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    nXe0M~WkW&nJ

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.ercolina-usa.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    nXe0M~WkW&nJ

Targets

    • Target

      SPECIFICATIONS.exe

    • Size

      593KB

    • MD5

      22f0e30734f6f9b47f01e8a4c0b5c3b2

    • SHA1

      c165ee5537f8a0f40fdb28020caf45d896195224

    • SHA256

      f11112b253e141587881a55fe11cb6de669b7a9988fcd1b6b70c9caffc302e07

    • SHA512

      b7da4110b918da2f8986707e169cf05ead4523b41b7c6d3bb999ca78d9ce9db0784d510b866da80c37dd93e2fba87588d2a8e8b7d92786a85bbb34472a2c19a1

    • SSDEEP

      12288:POykmX/JQYZN3EgyhqkR/1PUhyV21xEkFqVcsQaqAqn26jZsU:2NAxQOlfm918hyVIxEaGcsQRAA26t1

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • UAC bypass

    • Windows security bypass

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks