General

  • Target

    4ff810b6c4591c0fa36f0c847f8bfcdde91c6f218b0fa123826f12ec4f542ab5.exe

  • Size

    1.3MB

  • Sample

    250121-dd7azasqc1

  • MD5

    6a1679693ea637a2b65b965dd496d045

  • SHA1

    282d192e2327fdcfd00ec6f217638a09e8ac3616

  • SHA256

    4ff810b6c4591c0fa36f0c847f8bfcdde91c6f218b0fa123826f12ec4f542ab5

  • SHA512

    10684689d7bf46b98aee82b034cbba3f3fd647e1c662fec2a2c22bdfeae40006dd83bba29502ec7beb626557edec7ef53ff34a3561b0e634721e90fe66171002

  • SSDEEP

    24576:7yaTivn9N/a/3Z67jWOO8Fv0Ojmxi0X5aCsyIh8LyKQ5vd95S:Waa9N/aPZajbO8FcOjxK1sOLyKQFH5

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://s4.serv00.com
  • Port:
    21
  • Username:
    f2241_evica
  • Password:
    Doll650@@

Targets

    • Target

      4ff810b6c4591c0fa36f0c847f8bfcdde91c6f218b0fa123826f12ec4f542ab5.exe

    • Size

      1.3MB

    • MD5

      6a1679693ea637a2b65b965dd496d045

    • SHA1

      282d192e2327fdcfd00ec6f217638a09e8ac3616

    • SHA256

      4ff810b6c4591c0fa36f0c847f8bfcdde91c6f218b0fa123826f12ec4f542ab5

    • SHA512

      10684689d7bf46b98aee82b034cbba3f3fd647e1c662fec2a2c22bdfeae40006dd83bba29502ec7beb626557edec7ef53ff34a3561b0e634721e90fe66171002

    • SSDEEP

      24576:7yaTivn9N/a/3Z67jWOO8Fv0Ojmxi0X5aCsyIh8LyKQ5vd95S:Waa9N/aPZajbO8FcOjxK1sOLyKQFH5

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks