General

  • Target

    6aba1deb82e5245cfd480adf8e20d672b19b6ec35219312c8821a7abc39e0634

  • Size

    678KB

  • Sample

    241222-bgc57axlbq

  • MD5

    e7263f6a8a0c3ccc1622e608cbc05f1c

  • SHA1

    33b4c67c98f3397f82da59ca95cddb3e31016b40

  • SHA256

    6aba1deb82e5245cfd480adf8e20d672b19b6ec35219312c8821a7abc39e0634

  • SHA512

    1da8574ae8c5c7879ccd1fd4ca7f326a4174fcaafee05d2f1a8731defcc57d6d1e5d603713dcd6ea7fc62d0eb46151bc6b806203c2f46b422928e72243a6be7e

  • SSDEEP

    12288:asHzOUNUSB/o5LsI1uwajJ5yvv1l2j1rn2ICWjb/bvWN:NiUmSB/o5d1ubcvsFn2IV/bi

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.antoniomayol.com:21
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    cMhKDQUk1{;%

Targets

    • Target

      6aba1deb82e5245cfd480adf8e20d672b19b6ec35219312c8821a7abc39e0634

    • Size

      678KB

    • MD5

      e7263f6a8a0c3ccc1622e608cbc05f1c

    • SHA1

      33b4c67c98f3397f82da59ca95cddb3e31016b40

    • SHA256

      6aba1deb82e5245cfd480adf8e20d672b19b6ec35219312c8821a7abc39e0634

    • SHA512

      1da8574ae8c5c7879ccd1fd4ca7f326a4174fcaafee05d2f1a8731defcc57d6d1e5d603713dcd6ea7fc62d0eb46151bc6b806203c2f46b422928e72243a6be7e

    • SSDEEP

      12288:asHzOUNUSB/o5LsI1uwajJ5yvv1l2j1rn2ICWjb/bvWN:NiUmSB/o5d1ubcvsFn2IV/bi

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks