General

  • Target

    444a5f9a40e319beb2b062de6e9c776f6fbaceb2ca588f92d6651a8fdf46e69d

  • Size

    1.1MB

  • Sample

    250129-br7sjszkbm

  • MD5

    1f383b406074c2253d0e4a979703540d

  • SHA1

    246c5ad4c8c719e430509dd7023536759cc2af6a

  • SHA256

    444a5f9a40e319beb2b062de6e9c776f6fbaceb2ca588f92d6651a8fdf46e69d

  • SHA512

    32b38a211f0abb8c68c93888ed8fa4234ff9e35073b94f4d8d665d82459bd6da15c0504d29728ea6bbfd6a4abd0e07ab538b2237800b85ae5624bf223a1d8ba9

  • SSDEEP

    24576:uRmJkcoQricOIQxiZY1WNQKlrjlg3p2JGLNx7qqN2O88:7JZoQrbTFZY1WNQKzg3p2cLNxuqoO9

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.antoniomayol.com:21
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    cMhKDQUk1{;%

Targets

    • Target

      444a5f9a40e319beb2b062de6e9c776f6fbaceb2ca588f92d6651a8fdf46e69d

    • Size

      1.1MB

    • MD5

      1f383b406074c2253d0e4a979703540d

    • SHA1

      246c5ad4c8c719e430509dd7023536759cc2af6a

    • SHA256

      444a5f9a40e319beb2b062de6e9c776f6fbaceb2ca588f92d6651a8fdf46e69d

    • SHA512

      32b38a211f0abb8c68c93888ed8fa4234ff9e35073b94f4d8d665d82459bd6da15c0504d29728ea6bbfd6a4abd0e07ab538b2237800b85ae5624bf223a1d8ba9

    • SSDEEP

      24576:uRmJkcoQricOIQxiZY1WNQKlrjlg3p2JGLNx7qqN2O88:7JZoQrbTFZY1WNQKzg3p2cLNxuqoO9

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks