General

  • Target

    OC 1398984.exe

  • Size

    257KB

  • Sample

    240809-js3h8ayanp

  • MD5

    bdb862c5d149ab30b8843435eff1de0d

  • SHA1

    9dfc255a56023e6eb06499baaa9a7440b766061a

  • SHA256

    ce8a1fa1dece3f12415c68769d60da8b709d3fefb5543b8335d88b117d9db2ca

  • SHA512

    995af0ed5d842ac56f26ba3362841317d6f8153c2bc13186c402a99194169b2afecd4ef0bd31e940121f946c00624758d4c8f98a6c30da4ceb5da67f1a80118e

  • SSDEEP

    6144:01VtfMapUCX6Mg9gqQv3oEJEYnDQ4jYv:01ffb8Mg9sv35JEYM4G

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.solucionesmexico.mx
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    dGG^ZYIxX5!B

Targets

    • Target

      OC 1398984.exe

    • Size

      257KB

    • MD5

      bdb862c5d149ab30b8843435eff1de0d

    • SHA1

      9dfc255a56023e6eb06499baaa9a7440b766061a

    • SHA256

      ce8a1fa1dece3f12415c68769d60da8b709d3fefb5543b8335d88b117d9db2ca

    • SHA512

      995af0ed5d842ac56f26ba3362841317d6f8153c2bc13186c402a99194169b2afecd4ef0bd31e940121f946c00624758d4c8f98a6c30da4ceb5da67f1a80118e

    • SSDEEP

      6144:01VtfMapUCX6Mg9gqQv3oEJEYnDQ4jYv:01ffb8Mg9sv35JEYM4G

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks