General

  • Target

    be772653d6309229abd3c51035e19a2b52f7567752c52a0fa5f73405c6e42841

  • Size

    1.0MB

  • Sample

    240327-br74bagh93

  • MD5

    d83604a76d2975aa5710ccc0c3ba7f2c

  • SHA1

    3e3acaebbb659efb6f4c48b7f46d96768684dc1b

  • SHA256

    be772653d6309229abd3c51035e19a2b52f7567752c52a0fa5f73405c6e42841

  • SHA512

    0bfb5c48b73a7a7694aa2f9cccfecd2919485e215e5edfbb313513cbd7646e8a336727db0ee2e12f540f9e7f5c888d4b42034aaae4b3232f77720c8e8c1b61c2

  • SSDEEP

    24576:JAHnh+eWsN3skA4RV1Hom2KXMmHaJ0xusEllZ1LUOzYw5:Qh+ZkldoPK8YaJ0xnKhUOzr

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    -GN,s*KH{VEhPmo)+f

Targets

    • Target

      be772653d6309229abd3c51035e19a2b52f7567752c52a0fa5f73405c6e42841

    • Size

      1.0MB

    • MD5

      d83604a76d2975aa5710ccc0c3ba7f2c

    • SHA1

      3e3acaebbb659efb6f4c48b7f46d96768684dc1b

    • SHA256

      be772653d6309229abd3c51035e19a2b52f7567752c52a0fa5f73405c6e42841

    • SHA512

      0bfb5c48b73a7a7694aa2f9cccfecd2919485e215e5edfbb313513cbd7646e8a336727db0ee2e12f540f9e7f5c888d4b42034aaae4b3232f77720c8e8c1b61c2

    • SSDEEP

      24576:JAHnh+eWsN3skA4RV1Hom2KXMmHaJ0xusEllZ1LUOzYw5:Qh+ZkldoPK8YaJ0xnKhUOzr

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks