2019-02-07 - INFO STEALER (AGENT TESLA) THAT USES FTP TO EXFILTRATE DATA

NOTICE:

ASSOCIATED FILES:

  • 2019-02-07-cred-stealer-via-FTP-traffic.pcap   (1,822,495 bytes)
  • Zip archive of the malware:  AL5THvvehvvvajyc.exe.zip   577 kB (576,974 bytes)
    • AL5THvvehvvvajyc.exe   (906,920 bytes)

    NOTES:


    Shown above:  Flow chart for this infection chain.

     

    WEB TRAFFIC BLOCK LIST

    Indicators are not a block list.  If you feel the need to block Internet traffic, I suggest the following:

     

    TRAFFIC


    Shown above:  Infection traffic filtered in Wireshark.

     

    TRAFFIC FROM AN INFECTED WINDOWS HOST:

     

    FILE HASHES

    MALICIOUS EXECUTABLE:

     

    IMAGES


    Shown above:  Malware persistent on the infected Windows host.

     


    Shown above:  More information on the malicious executable.

     


    Shown above:  Files on the FTP server the malware sent stolen credentials to.  The JPEG files are screenshots from my infected Windows host.  Looks like this FTP server
    was used for stolen credentials as early as 2019-01-30.

     

    Click here to return to the main page.