General

  • Target

    4f338449a4fa2e63dbc9aac4d96e4a4d47aacc96ea5fe62ef55301a464be0dcf.exe

  • Size

    1.4MB

  • Sample

    250111-bvnh3szkbl

  • MD5

    52f3d27880413a677515ebf02774a004

  • SHA1

    24a8e07105ffdd4fac3b3218dc03ecc60cba485a

  • SHA256

    4f338449a4fa2e63dbc9aac4d96e4a4d47aacc96ea5fe62ef55301a464be0dcf

  • SHA512

    d2e32db4c19e3cec29e84493f8f33a4c89b205203ada48c0228c2bcc4f11e8f75dd7b24a23e1082263d42470b36b2db2de2b1da5985981c3028cc082c428d721

  • SSDEEP

    24576:HqDEvCTbMWu7rQYlBQcBiT6rprG8anWRq0+Z+HBajhLwvAiETdbUpSFS:HTvC/MTQYxsWR7anWw03hajCojRb6A

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.stingatoareincendii.ro
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    3.*RYhlG)lkA

Targets

    • Target

      4f338449a4fa2e63dbc9aac4d96e4a4d47aacc96ea5fe62ef55301a464be0dcf.exe

    • Size

      1.4MB

    • MD5

      52f3d27880413a677515ebf02774a004

    • SHA1

      24a8e07105ffdd4fac3b3218dc03ecc60cba485a

    • SHA256

      4f338449a4fa2e63dbc9aac4d96e4a4d47aacc96ea5fe62ef55301a464be0dcf

    • SHA512

      d2e32db4c19e3cec29e84493f8f33a4c89b205203ada48c0228c2bcc4f11e8f75dd7b24a23e1082263d42470b36b2db2de2b1da5985981c3028cc082c428d721

    • SSDEEP

      24576:HqDEvCTbMWu7rQYlBQcBiT6rprG8anWRq0+Z+HBajhLwvAiETdbUpSFS:HTvC/MTQYxsWR7anWw03hajCojRb6A

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks