General

  • Target

    87dd8113209ff40133d73293db20053b47ae2e2340f0aa9b3a6ff2a792ed6c5e

  • Size

    729KB

  • Sample

    250124-bgen1ssjgx

  • MD5

    ac940c3a94dbb6599f3ca0decf7d5134

  • SHA1

    0bd1e505e538656b84c004a5d3f6c0d18156b19a

  • SHA256

    87dd8113209ff40133d73293db20053b47ae2e2340f0aa9b3a6ff2a792ed6c5e

  • SHA512

    bcd0bf971002ec6e38ea206283b5527121eda32077a25ac930c6594efb8cf53a3df72cc0dba113b08731c044aaf7c0a9174a3316afdd895871a8b7692719ff07

  • SSDEEP

    12288:uHmV/54cNmO8sK1L8yQXOC3i3ixalKQXiW3Zpg1Lk+b2v84q28Je8T9DORA9oX:uGVGcNeL1L8LOC3cKOpW4q2N4ERJ

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.stingatoareincendii.ro
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    3.*RYhlG)lkA

Targets

    • Target

      cotizaci¨®n.exe

    • Size

      817KB

    • MD5

      f3b68f20847d3e616e50bd16477d54e4

    • SHA1

      a814d2ff9595740b47b9e8f66d4618d533adb55a

    • SHA256

      b4f78f84d99b3981f0bd7090b096ae98776be7a8fdd50aedbb5ccb502d4f953a

    • SHA512

      bce550bb274f2b8cffe4ea54f6008abb554f958a44db4a920e599eac971c7e8f87ac29f59fe6a977f2117c36df724370f787a50c687cd3718379338fb7e752cc

    • SSDEEP

      24576:OthEVaPqLE6pqqfQdOpKPagiyRliTz7YhSX:WEVUcE6pqqf8PPkUI

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks