General

  • Target

    edbb67d7ff0eebc5dfee919d6524d555ce04864e3261ecf12af1b6ea05c10f0d

  • Size

    864KB

  • Sample

    250123-jrsbvs1pej

  • MD5

    40d8666ec301b58ec84d71d132b70a02

  • SHA1

    afdf5ee0f0ed22404045ec3b57f0b0c597bb1c69

  • SHA256

    edbb67d7ff0eebc5dfee919d6524d555ce04864e3261ecf12af1b6ea05c10f0d

  • SHA512

    4f0523a0e6b04d641a4ebc71d486178656c444b37109c732ded09b6af8a1724798722c10ba1a5fdc6a623911dedd784fdd6d554dd13973de5afd72b58d2a806e

  • SSDEEP

    24576:e7kOqWKoqnUlKv51l97Jh2u/7o4CFpHmw/+vzmX6:eICK/nBBvZk4emUEe6

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.ercolina-usa.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    nXe0M~WkW&nJ

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.ercolina-usa.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    nXe0M~WkW&nJ

Targets

    • Target

      MACHINE QUOTATION.exe

    • Size

      1.2MB

    • MD5

      6373a333313ed5bbf4ed81c1c609ff5e

    • SHA1

      79c0d2304c0d4e2163ed4e6fb15500f330d3a3e4

    • SHA256

      75fde62955120651791091525d40b552f763930e9e9a81199ea8a99a9c67d683

    • SHA512

      eb39258cd4684fa9b8941ac13a019e9e630f0333ba51385a68c18ee8f04cb30e06c256f67b2da2dfbc0902acc64ffca282b9de550bd3fe1f4b6129de810dd78e

    • SSDEEP

      24576:KRmJkcoQricOIQxiZY1ia23X3tf58Bbu9yS5AMiODrc7fKBB20R4+:PJZoQrbTFZY1ia2H3tf29uEr7fn+

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks