General

  • Target

    77f5c4bc941f022b34d7962f41ec13c2b74ac61769d9633fa49a8cd1a50c101a

  • Size

    511KB

  • Sample

    250110-be22jawpdz

  • MD5

    2d03048b7d25d299fe5c7e4dd46ae1ae

  • SHA1

    2854cafd06d6e92a2559a3b17da47b0fa3e07568

  • SHA256

    77f5c4bc941f022b34d7962f41ec13c2b74ac61769d9633fa49a8cd1a50c101a

  • SHA512

    c6318654a554a4a765db641b6ee54228c950910ec61201089c43dbce640d48f45a3bcb390b73ce13c843de72e582e33f3ffb9df8b15e3ba2a6bf6a510fc8ab25

  • SSDEEP

    12288:VmIgJcJPk7rmRDupKECkrWtawHTmWIUQ88aSlMbQH:dgJcJPkP+upj3WtfHTmW3l8BMbe

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.lampadari.gr
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    P8P[uVeJU=vh

Targets

    • Target

      Nueva orden.pdf.exe

    • Size

      2.2MB

    • MD5

      5c56f7b36c3eb8ef883c56b817deb84a

    • SHA1

      4cd5ac8d38c6a404060f8256bbeb3c47f4c6bf9f

    • SHA256

      04bdc8b7b3fef8114c7be89c4eb90769e91dc50c8af12d518f724f15519d71a8

    • SHA512

      62977535ce741a7be1d9c3e1e4cced8774592081eb6819c869aa982ae69fb4bf6a78bdbabaab8f7d81e82c0bb10ad4f55e4082194d95bf910c5788bf62378844

    • SSDEEP

      49152:Y3ASbdYAm4zEbdYAm4zWbdYAm4z23Ag3AWbdYAm4zSbdYAm4zO3AgS+t:qA4drWdr0drkASA0dr4dr8AX

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks