General

  • Target

    ce7a1711cbfc3f9cdfb765c269031bd1e7a4992e313151ff3b98e333323f4f03

  • Size

    1.5MB

  • Sample

    250112-bqfmnsymgy

  • MD5

    79a91678871942f25e9c766039609a43

  • SHA1

    4cabdd8b0b93e9c67b1a14e5aac9bcd870af096d

  • SHA256

    ce7a1711cbfc3f9cdfb765c269031bd1e7a4992e313151ff3b98e333323f4f03

  • SHA512

    275b9aa4ee0a80be666b326669a039cacdc5fc51027e59def6d9d1cb6d5e529847a8ba349c68a5b5ba9067ef9ad65f20624c184c36c7be1e13c5bf4879ff8a99

  • SSDEEP

    24576:Jme2yL1JdKheEsugptvNuBuaCblrrv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:JtTLXdceb9XvNzaw9jLoyEkmZ9Y14

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.atikol.cam
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    !L4!S@!C5kOUt88

Targets

    • Target

      ce7a1711cbfc3f9cdfb765c269031bd1e7a4992e313151ff3b98e333323f4f03

    • Size

      1.5MB

    • MD5

      79a91678871942f25e9c766039609a43

    • SHA1

      4cabdd8b0b93e9c67b1a14e5aac9bcd870af096d

    • SHA256

      ce7a1711cbfc3f9cdfb765c269031bd1e7a4992e313151ff3b98e333323f4f03

    • SHA512

      275b9aa4ee0a80be666b326669a039cacdc5fc51027e59def6d9d1cb6d5e529847a8ba349c68a5b5ba9067ef9ad65f20624c184c36c7be1e13c5bf4879ff8a99

    • SSDEEP

      24576:Jme2yL1JdKheEsugptvNuBuaCblrrv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:JtTLXdceb9XvNzaw9jLoyEkmZ9Y14

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks