General

  • Target

    79298ce979a88b5476b34311d505eb7ac2de50f2fa6f40ad4d5a723499180511

  • Size

    1.0MB

  • Sample

    250111-bndejayqcq

  • MD5

    7050ed6c98a8bf4492abfe6d7739a43a

  • SHA1

    4f5e78b6f75de1807f9caf42c4be91e9180cadf2

  • SHA256

    79298ce979a88b5476b34311d505eb7ac2de50f2fa6f40ad4d5a723499180511

  • SHA512

    3c06cbaae8f03a79c27297b8c5740663a06f5dab30b051b21d2c43f4f2803c70f14f3bb48c74e385c77bbd04b83fdcd5fcb8008032e04aa997eed7e2090c83a0

  • SSDEEP

    24576:mu6J33O0c+JY5UZ+XC0kGsoTCcitXcV7B0bUWFtWY:ou0c++OCvkGsECcitX03WKY

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.antoniomayol.com:21
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    cMhKDQUk1{;%

Targets

    • Target

      79298ce979a88b5476b34311d505eb7ac2de50f2fa6f40ad4d5a723499180511

    • Size

      1.0MB

    • MD5

      7050ed6c98a8bf4492abfe6d7739a43a

    • SHA1

      4f5e78b6f75de1807f9caf42c4be91e9180cadf2

    • SHA256

      79298ce979a88b5476b34311d505eb7ac2de50f2fa6f40ad4d5a723499180511

    • SHA512

      3c06cbaae8f03a79c27297b8c5740663a06f5dab30b051b21d2c43f4f2803c70f14f3bb48c74e385c77bbd04b83fdcd5fcb8008032e04aa997eed7e2090c83a0

    • SSDEEP

      24576:mu6J33O0c+JY5UZ+XC0kGsoTCcitXcV7B0bUWFtWY:ou0c++OCvkGsECcitX03WKY

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks