General

  • Target

    06f6eccac99f9be344bfba51fbccb827405551767d00224ef06c2e2f525f95af.exe

  • Size

    1.0MB

  • Sample

    250111-clp6zs1mdp

  • MD5

    edb2e2cea8df699849675ccf5f9b12b4

  • SHA1

    a5eb63f4ad859b4925ca9f6a7511c13201387256

  • SHA256

    06f6eccac99f9be344bfba51fbccb827405551767d00224ef06c2e2f525f95af

  • SHA512

    3e0181f68c6a6881d18ffb79938672d0c2e948e4931332481072d18cf67ea29ce3d89976a1277a4ab21c32e6913043af1bbeba8bcbcebcb93cd615e6164361f8

  • SSDEEP

    24576:qu6J33O0c+JY5UZ+XC0kGso6FaX4pSSSoiPGHDBWY:cu0c++OCvkGs9FaX1SNiPGYY

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.jeepcommerce.rs
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Q6]7rLSD*gU2

Targets

    • Target

      06f6eccac99f9be344bfba51fbccb827405551767d00224ef06c2e2f525f95af.exe

    • Size

      1.0MB

    • MD5

      edb2e2cea8df699849675ccf5f9b12b4

    • SHA1

      a5eb63f4ad859b4925ca9f6a7511c13201387256

    • SHA256

      06f6eccac99f9be344bfba51fbccb827405551767d00224ef06c2e2f525f95af

    • SHA512

      3e0181f68c6a6881d18ffb79938672d0c2e948e4931332481072d18cf67ea29ce3d89976a1277a4ab21c32e6913043af1bbeba8bcbcebcb93cd615e6164361f8

    • SSDEEP

      24576:qu6J33O0c+JY5UZ+XC0kGso6FaX4pSSSoiPGHDBWY:cu0c++OCvkGs9FaX1SNiPGYY

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks