General

  • Target

    ae9f157e9ac6956863d36c82f45f27fa14fa6f78ad98ba73218593b5d32f44c6.exe

  • Size

    1023KB

  • Sample

    240425-carwfadb82

  • MD5

    19bfc45905c5ffc65bc1eb28653c8d5a

  • SHA1

    0ffd6ef93cd63cfbf559713b26c3b40f3b205ad4

  • SHA256

    ae9f157e9ac6956863d36c82f45f27fa14fa6f78ad98ba73218593b5d32f44c6

  • SHA512

    9d322500e1552bb96871babe823f65ce486155502eb9b23468815b5eefa3f06aba9db338228cd2823eb40bc1d4157fa43711ac552b991ac689f8d4c170cb7697

  • SSDEEP

    24576:oAHnh+eWsN3skA4RV1Hom2KXMmHa1bY/fIB00ul5:vh+ZkldoPK8Ya1bYn

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    4r@d15PS!-!h

Targets

    • Target

      ae9f157e9ac6956863d36c82f45f27fa14fa6f78ad98ba73218593b5d32f44c6.exe

    • Size

      1023KB

    • MD5

      19bfc45905c5ffc65bc1eb28653c8d5a

    • SHA1

      0ffd6ef93cd63cfbf559713b26c3b40f3b205ad4

    • SHA256

      ae9f157e9ac6956863d36c82f45f27fa14fa6f78ad98ba73218593b5d32f44c6

    • SHA512

      9d322500e1552bb96871babe823f65ce486155502eb9b23468815b5eefa3f06aba9db338228cd2823eb40bc1d4157fa43711ac552b991ac689f8d4c170cb7697

    • SSDEEP

      24576:oAHnh+eWsN3skA4RV1Hom2KXMmHa1bY/fIB00ul5:vh+ZkldoPK8Ya1bYn

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks