General

  • Target

    29a6cdb9e68995eddc788cb46162c8c5cee32b7aa4e4fc5932bf2c6ec1fc4be9

  • Size

    729KB

  • Sample

    250124-bj2asstpan

  • MD5

    313658f733b646605422a1d61ef02053

  • SHA1

    ac096f78526251be8d20511f1a0f492a26f05898

  • SHA256

    29a6cdb9e68995eddc788cb46162c8c5cee32b7aa4e4fc5932bf2c6ec1fc4be9

  • SHA512

    1fa4756b4e755f11dc45783bda7e10a073d32e5a2c771d213892bbc71b45098d445a88fb10f200c8472c0aada0a466e71a62d0cdd6f0494fd719a0bf82f6dd26

  • SSDEEP

    12288:uHmV/54cNmO8sK1L8yQXOC3i3ixalKQXiW3Zpg1Lk+b2v84q28Je8T9DORA9o1:uGVGcNeL1L8LOC3cKOpW4q2N4ERr

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.stingatoareincendii.ro
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    3.*RYhlG)lkA

Targets

    • Target

      cotizaci¨®n.exe

    • Size

      817KB

    • MD5

      f3b68f20847d3e616e50bd16477d54e4

    • SHA1

      a814d2ff9595740b47b9e8f66d4618d533adb55a

    • SHA256

      b4f78f84d99b3981f0bd7090b096ae98776be7a8fdd50aedbb5ccb502d4f953a

    • SHA512

      bce550bb274f2b8cffe4ea54f6008abb554f958a44db4a920e599eac971c7e8f87ac29f59fe6a977f2117c36df724370f787a50c687cd3718379338fb7e752cc

    • SSDEEP

      24576:OthEVaPqLE6pqqfQdOpKPagiyRliTz7YhSX:WEVUcE6pqqf8PPkUI

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks