General

  • Target

    667775a1703c8164ddc01a6a79913c36424b56925d6b5ac253d505f071a08adb

  • Size

    543KB

  • Sample

    250123-bg171swjbj

  • MD5

    552607ca8eaec23b7b6bb0f6a2436bd1

  • SHA1

    316528f39fd8f5a9cb77861851fe8d00284882ad

  • SHA256

    667775a1703c8164ddc01a6a79913c36424b56925d6b5ac253d505f071a08adb

  • SHA512

    23d2a15ede2d4d4e2ab03db4df0f449182c93787e68446e345c3de150fac27e9a45b95afa4ec5c798bc2653e6fd090775107894a6039580d2646cff744a56d9a

  • SSDEEP

    12288:4bUudVzYS2Gshu1vn292YdhjOs15NV9v6N78Pzh4I13GjGXxJ:4YmVJ2Vhu1U2YvjOwViN78PyW3GjGXxJ

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.fosna.net
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    =A+N^@~c]~#I

Targets

    • Target

      Comprobante_swift_9767864574756346523546576ds8977564534253465789.exe

    • Size

      1.0MB

    • MD5

      44540fed4d01394f0b4af89a372f8e08

    • SHA1

      a97259381e49377b7306b37b3c3d67950a9c1639

    • SHA256

      95ee92373414af760fdf7f450b166853a7ddb7e071991f86397cae1a278618f4

    • SHA512

      051e2d4a21d17c476608c42f877b6ee6daa9f41b6fa83ad08863a85528f1c68631fff85bc70950b66a27f1055d31c47f3fe010d28c7af45eaf8c251838a4e594

    • SSDEEP

      12288:PCdOy3vVrKxR5CXbNjAOxK/j2n+4YG/6c1mFFja3mXgcjfRlgsUBgaJTHl9nX7AS:PCdxte/80jYLT3U1jfsWaNkRuiSUQ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks