General

  • Target

    3b179d5994f08d3d329854a922abfea0N

  • Size

    603KB

  • Sample

    240829-f1qb3svhmg

  • MD5

    3b179d5994f08d3d329854a922abfea0

  • SHA1

    898cb8fd1908788d5976b7eabeb1399c33420792

  • SHA256

    acac117971676512df7695168371016c5d2d4066bd30e6e17fc095f916e052e3

  • SHA512

    fd7f2a103c3cd48b02def90fb00e336c02320680d5e325f6d9af37185a72eadcc658d77b2bbd36b61b4d61550016b92b7535a2946d6b27864b6d41f48a1777f9

  • SSDEEP

    12288:3sHzOUNUSB/o5LsI1uwajJ5yvv1l2X8BDK5qbaVLAKbovpZRo:miUmSB/o5d1ubcvOwWYb2FbWH

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    -GN,s*KH{VEhPmo)+f

Targets

    • Target

      3b179d5994f08d3d329854a922abfea0N

    • Size

      603KB

    • MD5

      3b179d5994f08d3d329854a922abfea0

    • SHA1

      898cb8fd1908788d5976b7eabeb1399c33420792

    • SHA256

      acac117971676512df7695168371016c5d2d4066bd30e6e17fc095f916e052e3

    • SHA512

      fd7f2a103c3cd48b02def90fb00e336c02320680d5e325f6d9af37185a72eadcc658d77b2bbd36b61b4d61550016b92b7535a2946d6b27864b6d41f48a1777f9

    • SSDEEP

      12288:3sHzOUNUSB/o5LsI1uwajJ5yvv1l2X8BDK5qbaVLAKbovpZRo:miUmSB/o5d1ubcvOwWYb2FbWH

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks