General

  • Target

    3eda9fff3dbbc6e74162eec9de159c5c07cdc37f27c84ca20eece700ecf98666.exe

  • Size

    705KB

  • Sample

    250110-rezjeaylak

  • MD5

    254ea708867541a0b41fb64a6896bb2b

  • SHA1

    d0fb4c2e311c685ac97822f0e49ae77afda72ccc

  • SHA256

    3eda9fff3dbbc6e74162eec9de159c5c07cdc37f27c84ca20eece700ecf98666

  • SHA512

    2412318afb2415b97336aa1e64045e63993e79aadea29d6d0b25049f896114782818a7170afafafb8b1687cd9b0f8182f9bf3cd64c6d7cd8ca008da94ef53662

  • SSDEEP

    12288:oyH5mU+8fo3iraJEW6I/4xE+6R+sSSC4D0s9JT7Y9kas9Mof:1HxzakasgEsShm9u9U

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.fosna.net
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    (=8fPSH$KO_!

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.fosna.net
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    (=8fPSH$KO_!

Targets

    • Target

      3eda9fff3dbbc6e74162eec9de159c5c07cdc37f27c84ca20eece700ecf98666.exe

    • Size

      705KB

    • MD5

      254ea708867541a0b41fb64a6896bb2b

    • SHA1

      d0fb4c2e311c685ac97822f0e49ae77afda72ccc

    • SHA256

      3eda9fff3dbbc6e74162eec9de159c5c07cdc37f27c84ca20eece700ecf98666

    • SHA512

      2412318afb2415b97336aa1e64045e63993e79aadea29d6d0b25049f896114782818a7170afafafb8b1687cd9b0f8182f9bf3cd64c6d7cd8ca008da94ef53662

    • SSDEEP

      12288:oyH5mU+8fo3iraJEW6I/4xE+6R+sSSC4D0s9JT7Y9kas9Mof:1HxzakasgEsShm9u9U

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks