General

  • Target

    40317f210d1785b8daaab8aa3d3e9375e2dac7197f490ff0cf0a5946c809bdd4.exe

  • Size

    1.1MB

  • Sample

    240613-tszsfazenm

  • MD5

    4d90f77b8a8e345f4f68083873064a53

  • SHA1

    2f4d40852298bc26f6d3e53f8e4d8950bbf2b175

  • SHA256

    40317f210d1785b8daaab8aa3d3e9375e2dac7197f490ff0cf0a5946c809bdd4

  • SHA512

    02d0a53bc3b92bad00d3ae762663c3d5233392ae47d7b8fb3e7bcbd4a43532c2bac197121d509fcd8e66ac5883b88aad384d620cdcbde0a2ff1fab0d131c0e35

  • SSDEEP

    24576:gAHnh+eWsN3skA4RV1Hom2KXMmHa/0IbLVyCpdpHicu5:Xh+ZkldoPK8Ya/FbLVyCpdy

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.libreriagandhi.cl
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    x6p2^m#1#~+O

Targets

    • Target

      40317f210d1785b8daaab8aa3d3e9375e2dac7197f490ff0cf0a5946c809bdd4.exe

    • Size

      1.1MB

    • MD5

      4d90f77b8a8e345f4f68083873064a53

    • SHA1

      2f4d40852298bc26f6d3e53f8e4d8950bbf2b175

    • SHA256

      40317f210d1785b8daaab8aa3d3e9375e2dac7197f490ff0cf0a5946c809bdd4

    • SHA512

      02d0a53bc3b92bad00d3ae762663c3d5233392ae47d7b8fb3e7bcbd4a43532c2bac197121d509fcd8e66ac5883b88aad384d620cdcbde0a2ff1fab0d131c0e35

    • SSDEEP

      24576:gAHnh+eWsN3skA4RV1Hom2KXMmHa/0IbLVyCpdpHicu5:Xh+ZkldoPK8Ya/FbLVyCpdy

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks