General

  • Target

    RHGP0987090G.doc

  • Size

    7KB

  • Sample

    250129-gsr2daspbw

  • MD5

    a8cfd32e2bd9180b0b7bf1dcdc880f99

  • SHA1

    8e162cf763f149ac2d6436de1808df569a75f72b

  • SHA256

    dfade43b170cbeefcb58db57df4095fb2c109f85af3dd6bc514cbf2a9d86b2b9

  • SHA512

    6527d65392aec4e53d8fd65f26c1a5f5169b17e6332b9362bf0202cacddc175cf8ddaaf1d8f0392100dfb6c75e582091fbf0e5235f77d427ca67c4a8120938d2

  • SSDEEP

    48:OVcoVYEENMxQcvWvnCAJcSYl+UaOhkoq/lfwdPiLwmv7vpE8IMh7BqlEMAZRgFlk:435vibc3ksoidKLHvxIMh74l31AzOi

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.antoniomayol.com:21
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    cMhKDQUk1{;%

Targets

    • Target

      RHGP0987090G.doc

    • Size

      7KB

    • MD5

      a8cfd32e2bd9180b0b7bf1dcdc880f99

    • SHA1

      8e162cf763f149ac2d6436de1808df569a75f72b

    • SHA256

      dfade43b170cbeefcb58db57df4095fb2c109f85af3dd6bc514cbf2a9d86b2b9

    • SHA512

      6527d65392aec4e53d8fd65f26c1a5f5169b17e6332b9362bf0202cacddc175cf8ddaaf1d8f0392100dfb6c75e582091fbf0e5235f77d427ca67c4a8120938d2

    • SSDEEP

      48:OVcoVYEENMxQcvWvnCAJcSYl+UaOhkoq/lfwdPiLwmv7vpE8IMh7BqlEMAZRgFlk:435vibc3ksoidKLHvxIMh74l31AzOi

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks