General

  • Target

    3b038062894d610a3c95c6b6e3db4ffe78e6b0c31817d15317073247eeefefe7

  • Size

    1.0MB

  • Sample

    250107-bfd14awqev

  • MD5

    0c63dc7353268759cc84be78b15cded6

  • SHA1

    59af9e1612d4c575256b4e188151d746ee7a1045

  • SHA256

    3b038062894d610a3c95c6b6e3db4ffe78e6b0c31817d15317073247eeefefe7

  • SHA512

    d136888c7cf670e5af31dbc0126078851ee83b61f43dd46ba04c1d30788e7c78b97c8884550f9565d3557d40ec6890e341fe3e1a00a1a09cb8dfd6ef4ec9d487

  • SSDEEP

    24576:7u6J33O0c+JY5UZ+XC0kGsoTCclNposIjCtWY:1u0c++OCvkGsECclLo5Y

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.antoniomayol.com:21
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    cMhKDQUk1{;%

Targets

    • Target

      3b038062894d610a3c95c6b6e3db4ffe78e6b0c31817d15317073247eeefefe7

    • Size

      1.0MB

    • MD5

      0c63dc7353268759cc84be78b15cded6

    • SHA1

      59af9e1612d4c575256b4e188151d746ee7a1045

    • SHA256

      3b038062894d610a3c95c6b6e3db4ffe78e6b0c31817d15317073247eeefefe7

    • SHA512

      d136888c7cf670e5af31dbc0126078851ee83b61f43dd46ba04c1d30788e7c78b97c8884550f9565d3557d40ec6890e341fe3e1a00a1a09cb8dfd6ef4ec9d487

    • SSDEEP

      24576:7u6J33O0c+JY5UZ+XC0kGsoTCclNposIjCtWY:1u0c++OCvkGsECclLo5Y

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks