General

  • Target

    45bd45cca636329a23ee69891bfffb67fbaf6530245d422b86900f6435d48892

  • Size

    952KB

  • Sample

    250111-bkylaswpb1

  • MD5

    a1e0a4d056d7fafb7519c7920cbe63da

  • SHA1

    5fd45e290a999f316c20c30fb5a0775d50d0c135

  • SHA256

    45bd45cca636329a23ee69891bfffb67fbaf6530245d422b86900f6435d48892

  • SHA512

    6b868c366c99f64860c4912282f46b254f4e032847336d1a1716bd37bba12120e91fed4edc5491fbe4d990d39d6234ca2ef676cc6c438161b3af23a8f97e93a7

  • SSDEEP

    24576:w5mhA86sOMz/Jn6HvqwfG66s7igAPyEqxRo0WZ+pBejjL2tAyET/bUHqur1:w4hApIxixG66sO+xK0fzejeuTrbu1J

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.stingatoareincendii.ro
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    3.*RYhlG)lkA

Targets

    • Target

      PO-67642.exe

    • Size

      1.4MB

    • MD5

      52f3d27880413a677515ebf02774a004

    • SHA1

      24a8e07105ffdd4fac3b3218dc03ecc60cba485a

    • SHA256

      4f338449a4fa2e63dbc9aac4d96e4a4d47aacc96ea5fe62ef55301a464be0dcf

    • SHA512

      d2e32db4c19e3cec29e84493f8f33a4c89b205203ada48c0228c2bcc4f11e8f75dd7b24a23e1082263d42470b36b2db2de2b1da5985981c3028cc082c428d721

    • SSDEEP

      24576:HqDEvCTbMWu7rQYlBQcBiT6rprG8anWRq0+Z+HBajhLwvAiETdbUpSFS:HTvC/MTQYxsWR7anWw03hajCojRb6A

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks