General

  • Target

    bbb9c37d643e6302bb92445338abeaa909ceea85994a30baf205cdbb9ebbaa05

  • Size

    531KB

  • Sample

    241226-bktx4stjas

  • MD5

    7d5a73279a1b21f6c74453b1435b6188

  • SHA1

    3a3d443a962ced3dbd4376f7ef070d2dd117c97e

  • SHA256

    bbb9c37d643e6302bb92445338abeaa909ceea85994a30baf205cdbb9ebbaa05

  • SHA512

    519a9d56b3ac712600c84e8fab212e318afc24f64177019c696bf7bcf6cf4c70963c42861b5253fd2a9a2b4e2e9ee72ec1073df77876390d6d0748836836dcc4

  • SSDEEP

    12288:4quErHF6xC9D6DmR1J98w4oknqOOCyQfUYfp4IAgjNX3N8L:5rl6kD68JmlotQfTp1AgjNX96

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.stingatoareincendii.ro
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    3.*RYhlG)lkA

Targets

    • Target

      bbb9c37d643e6302bb92445338abeaa909ceea85994a30baf205cdbb9ebbaa05

    • Size

      531KB

    • MD5

      7d5a73279a1b21f6c74453b1435b6188

    • SHA1

      3a3d443a962ced3dbd4376f7ef070d2dd117c97e

    • SHA256

      bbb9c37d643e6302bb92445338abeaa909ceea85994a30baf205cdbb9ebbaa05

    • SHA512

      519a9d56b3ac712600c84e8fab212e318afc24f64177019c696bf7bcf6cf4c70963c42861b5253fd2a9a2b4e2e9ee72ec1073df77876390d6d0748836836dcc4

    • SSDEEP

      12288:4quErHF6xC9D6DmR1J98w4oknqOOCyQfUYfp4IAgjNX3N8L:5rl6kD68JmlotQfTp1AgjNX96

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks