General

  • Target

    rNuevaorden_pdf.exe

  • Size

    2.2MB

  • Sample

    250109-rdd63s1pht

  • MD5

    5c56f7b36c3eb8ef883c56b817deb84a

  • SHA1

    4cd5ac8d38c6a404060f8256bbeb3c47f4c6bf9f

  • SHA256

    04bdc8b7b3fef8114c7be89c4eb90769e91dc50c8af12d518f724f15519d71a8

  • SHA512

    62977535ce741a7be1d9c3e1e4cced8774592081eb6819c869aa982ae69fb4bf6a78bdbabaab8f7d81e82c0bb10ad4f55e4082194d95bf910c5788bf62378844

  • SSDEEP

    49152:Y3ASbdYAm4zEbdYAm4zWbdYAm4z23Ag3AWbdYAm4zSbdYAm4zO3AgS+t:qA4drWdr0drkASA0dr4dr8AX

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.lampadari.gr
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    P8P[uVeJU=vh

Targets

    • Target

      rNuevaorden_pdf.exe

    • Size

      2.2MB

    • MD5

      5c56f7b36c3eb8ef883c56b817deb84a

    • SHA1

      4cd5ac8d38c6a404060f8256bbeb3c47f4c6bf9f

    • SHA256

      04bdc8b7b3fef8114c7be89c4eb90769e91dc50c8af12d518f724f15519d71a8

    • SHA512

      62977535ce741a7be1d9c3e1e4cced8774592081eb6819c869aa982ae69fb4bf6a78bdbabaab8f7d81e82c0bb10ad4f55e4082194d95bf910c5788bf62378844

    • SSDEEP

      49152:Y3ASbdYAm4zEbdYAm4zWbdYAm4z23Ag3AWbdYAm4zSbdYAm4zO3AgS+t:qA4drWdr0drkASA0dr4dr8AX

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks