General

  • Target

    9ead91976fafebb24e1a160c982495b685758e48856bc37127ff973847de45bc

  • Size

    1.1MB

  • Sample

    250126-bjd59swpcx

  • MD5

    23d264359639e63caa7912f5b6ca2ebc

  • SHA1

    ba76d45638f8e2e5c30883db3a8e9ce38d1cf850

  • SHA256

    9ead91976fafebb24e1a160c982495b685758e48856bc37127ff973847de45bc

  • SHA512

    229327c09ee7375c8a0edb57a8e0f7297a7d34e755747b9269fab5bfe70b4d0cca6367e33d9cafede8869db145913b1c13497952ae4a6127200853fcacc92d02

  • SSDEEP

    24576:uRmJkcoQricOIQxiZY1iaCTPLnkyBeHgmxAVBgg:7JZoQrbTFZY1iaC3nk20DxAVBt

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.fosna.net
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    (=8fPSH$KO_!

Targets

    • Target

      9ead91976fafebb24e1a160c982495b685758e48856bc37127ff973847de45bc

    • Size

      1.1MB

    • MD5

      23d264359639e63caa7912f5b6ca2ebc

    • SHA1

      ba76d45638f8e2e5c30883db3a8e9ce38d1cf850

    • SHA256

      9ead91976fafebb24e1a160c982495b685758e48856bc37127ff973847de45bc

    • SHA512

      229327c09ee7375c8a0edb57a8e0f7297a7d34e755747b9269fab5bfe70b4d0cca6367e33d9cafede8869db145913b1c13497952ae4a6127200853fcacc92d02

    • SSDEEP

      24576:uRmJkcoQricOIQxiZY1iaCTPLnkyBeHgmxAVBgg:7JZoQrbTFZY1iaC3nk20DxAVBt

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks