General

  • Target

    b443234dd2905b1f545abcd1d7af37e65c4f84600a2fec5353af6cfdf81a5cde

  • Size

    13KB

  • Sample

    240511-bjszesfc46

  • MD5

    8caad7671afc57ce07f325d37422539a

  • SHA1

    8793cd21c9e80163ecebca08da1b95662201fdb0

  • SHA256

    b443234dd2905b1f545abcd1d7af37e65c4f84600a2fec5353af6cfdf81a5cde

  • SHA512

    0c57ee81b936139c6dbbe84e4e15d8243cac1d478dbc7ccb893888f9894a11bfa3ad1ec3787431f4ac62580798433b670e29fa5d782e8922670ca538f9455966

  • SSDEEP

    384:VfvRZHEBVQPyky0qAkMO7d+mohGqmt37UVnH+bKRpOVpPgR8VNibOHT:leV+v7qAi7gLhGBt37UVee6VR4O

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.controlfire.com.mx
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    0a4XlE=4t8mz

Targets

    • Target

      b443234dd2905b1f545abcd1d7af37e65c4f84600a2fec5353af6cfdf81a5cde

    • Size

      13KB

    • MD5

      8caad7671afc57ce07f325d37422539a

    • SHA1

      8793cd21c9e80163ecebca08da1b95662201fdb0

    • SHA256

      b443234dd2905b1f545abcd1d7af37e65c4f84600a2fec5353af6cfdf81a5cde

    • SHA512

      0c57ee81b936139c6dbbe84e4e15d8243cac1d478dbc7ccb893888f9894a11bfa3ad1ec3787431f4ac62580798433b670e29fa5d782e8922670ca538f9455966

    • SSDEEP

      384:VfvRZHEBVQPyky0qAkMO7d+mohGqmt37UVnH+bKRpOVpPgR8VNibOHT:leV+v7qAi7gLhGBt37UVee6VR4O

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks