General

  • Target

    b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014

  • Size

    804KB

  • Sample

    250123-bnkhvavmgs

  • MD5

    4122c9b31ec914b161c2dddcb92e06bd

  • SHA1

    c973a177f213a01d5737eae7daf2f0a9598f7f92

  • SHA256

    b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014

  • SHA512

    74463d55e678707566112ff1598cd70da2bedb83dcc6945e8cce60c96157261f79c5bd0b9c3e711d7bd4cb14b64dcecb2655d93b27148a324ed7e0b69ec2549c

  • SSDEEP

    12288:v6Wq4aaE6KwyF5L0Y2D1PqLqSwRGC3J5EBmptg39L2JGLa+RLlp7ApH3kRyMySj3:tthEVaPqLqlrjlg3p2JGLNx7qqN2O88

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.antoniomayol.com:21
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    cMhKDQUk1{;%

Targets

    • Target

      b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014

    • Size

      804KB

    • MD5

      4122c9b31ec914b161c2dddcb92e06bd

    • SHA1

      c973a177f213a01d5737eae7daf2f0a9598f7f92

    • SHA256

      b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014

    • SHA512

      74463d55e678707566112ff1598cd70da2bedb83dcc6945e8cce60c96157261f79c5bd0b9c3e711d7bd4cb14b64dcecb2655d93b27148a324ed7e0b69ec2549c

    • SSDEEP

      12288:v6Wq4aaE6KwyF5L0Y2D1PqLqSwRGC3J5EBmptg39L2JGLa+RLlp7ApH3kRyMySj3:tthEVaPqLqlrjlg3p2JGLNx7qqN2O88

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks