General

  • Target

    22d02c9746e250a2a792a5a7a64e3147deeb2f88ad76a1c3a3fc47d0d5faf6cf

  • Size

    1010KB

  • Sample

    240425-clfybadf4t

  • MD5

    a7ba425ea1437fbcf79e9cd2dea16aa4

  • SHA1

    285a5347bd6f6eb80ad853321e17da16ed6260f8

  • SHA256

    22d02c9746e250a2a792a5a7a64e3147deeb2f88ad76a1c3a3fc47d0d5faf6cf

  • SHA512

    0d3bfef1f4aee59f265c78207a85452c648ced99ab4698abd8c9558ca0f6e5b226b7950673992a44dc7fafb70f683976db47fdf53c96e3c586bd29d5c7109cbe

  • SSDEEP

    24576:OAHnh+eWsN3skA4RV1Hom2KXMmHazJElTax8K5:5h+ZkldoPK8YazJpT

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    4r@d15PS!-!h

Targets

    • Target

      22d02c9746e250a2a792a5a7a64e3147deeb2f88ad76a1c3a3fc47d0d5faf6cf

    • Size

      1010KB

    • MD5

      a7ba425ea1437fbcf79e9cd2dea16aa4

    • SHA1

      285a5347bd6f6eb80ad853321e17da16ed6260f8

    • SHA256

      22d02c9746e250a2a792a5a7a64e3147deeb2f88ad76a1c3a3fc47d0d5faf6cf

    • SHA512

      0d3bfef1f4aee59f265c78207a85452c648ced99ab4698abd8c9558ca0f6e5b226b7950673992a44dc7fafb70f683976db47fdf53c96e3c586bd29d5c7109cbe

    • SSDEEP

      24576:OAHnh+eWsN3skA4RV1Hom2KXMmHazJElTax8K5:5h+ZkldoPK8YazJpT

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks