General

  • Target

    0b36cd8b19057f3cdaaff1c857d07a5351e2c410772d154894a54d2fc3ab621a

  • Size

    880KB

  • Sample

    250124-d89dtayqer

  • MD5

    7695837efba3682154ebfcf4485a4d88

  • SHA1

    b38ba022f5d5a4c2b034c694becf0be50742e581

  • SHA256

    0b36cd8b19057f3cdaaff1c857d07a5351e2c410772d154894a54d2fc3ab621a

  • SHA512

    4a8cd1ca665329c3d7f6f46f4e3dac59004622b8654a50a6e82c39db1bd532b16c8f04cc8a2c5ca1694a9919824a17519640a66afa7757d8dc97ca0b2b6e1f0f

  • SSDEEP

    12288:hCL8ZO8rXM3nq9S52zoqeWYZbBy7UblrC1ynq2Xf944VbsUyChUS1RkHLVNNhuSP:g7kOqWKoqnUltTfTbsUyuU2cLbXuVZA

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.ercolina-usa.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    nXe0M~WkW&nJ

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.ercolina-usa.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    nXe0M~WkW&nJ

Targets

    • Target

      QUOTATION#012325.exe

    • Size

      1.2MB

    • MD5

      18360b4431fb437521a2257734fede30

    • SHA1

      d7d4686fc4f320c1535fed4ec1a3e4a185675d51

    • SHA256

      1dad8b07c16757a4f505298e9fc7d6ae3dfa8f03ca9cdebf38dd47cc761287d5

    • SHA512

      8750080ababf0f2812903b3f5baefe725b1a7907acd2f1989e474b007e3a087121335f4bae63ad6b6de65c5c6ad62f592da82ba5af5d0029cd7ce9320c9a453f

    • SSDEEP

      24576:KRmJkcoQricOIQxiZY1ia23X3tfzfj4unHFObGJl:PJZoQrbTFZY1ia2H3tfzfj4unEGJl

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks