General

  • Target

    4fd3fcb1b88f7709f233bccd02d98ce0N.exe

  • Size

    1.0MB

  • Sample

    240831-j5q1ystgkd

  • MD5

    4fd3fcb1b88f7709f233bccd02d98ce0

  • SHA1

    4f3381b79ca956136527724ed359fd55aae982a8

  • SHA256

    54d8a9c0a8a4e49101f0215a386a8bdeb1095bd3abacf89487c9e41d115fe27c

  • SHA512

    0d0dc25fc69ef96307fdbe49705bfc318427df515162de9a0e42393a2642b15d66200582e0dde07b441a7beecd1e07576df0c5ffe76cdf025cec7b0e22956e2e

  • SSDEEP

    24576:5AHnh+eWsN3skA4RV1Hom2KXcmtcWBTaE9WHWivD5:Ah+ZkldoPKsacWFcN

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.solucionesmexico.mx
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    dGG^ZYIxX5!B

Targets

    • Target

      4fd3fcb1b88f7709f233bccd02d98ce0N.exe

    • Size

      1.0MB

    • MD5

      4fd3fcb1b88f7709f233bccd02d98ce0

    • SHA1

      4f3381b79ca956136527724ed359fd55aae982a8

    • SHA256

      54d8a9c0a8a4e49101f0215a386a8bdeb1095bd3abacf89487c9e41d115fe27c

    • SHA512

      0d0dc25fc69ef96307fdbe49705bfc318427df515162de9a0e42393a2642b15d66200582e0dde07b441a7beecd1e07576df0c5ffe76cdf025cec7b0e22956e2e

    • SSDEEP

      24576:5AHnh+eWsN3skA4RV1Hom2KXcmtcWBTaE9WHWivD5:Ah+ZkldoPKsacWFcN

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks