General

  • Target

    a419ccaf4f503aca90a05b8e2bb16f85e691c36d5fd4847be5d48db9cb5641f4.exe

  • Size

    1.1MB

  • Sample

    240905-b2vwqszhrq

  • MD5

    eb5ba52c5fbc1efa1d7e3c7d9364654e

  • SHA1

    fa088e270c9df961788001611785051280fbd09c

  • SHA256

    a419ccaf4f503aca90a05b8e2bb16f85e691c36d5fd4847be5d48db9cb5641f4

  • SHA512

    2facede2a967280d728111190ce0d4c3ea6cc20cb0e4079368976c98bb673807242c52a44261fd3164a35f5f19acf16c2e98fdceb18112b07f986243d435dbe4

  • SSDEEP

    24576:YqDEvCTbMWu7rQYlBQcBiT6rprG8autKPcz5nMzzZ:YTvC/MTQYxsWR7autz

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.solucionesmexico.mx
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    dGG^ZYIxX5!B

Targets

    • Target

      a419ccaf4f503aca90a05b8e2bb16f85e691c36d5fd4847be5d48db9cb5641f4.exe

    • Size

      1.1MB

    • MD5

      eb5ba52c5fbc1efa1d7e3c7d9364654e

    • SHA1

      fa088e270c9df961788001611785051280fbd09c

    • SHA256

      a419ccaf4f503aca90a05b8e2bb16f85e691c36d5fd4847be5d48db9cb5641f4

    • SHA512

      2facede2a967280d728111190ce0d4c3ea6cc20cb0e4079368976c98bb673807242c52a44261fd3164a35f5f19acf16c2e98fdceb18112b07f986243d435dbe4

    • SSDEEP

      24576:YqDEvCTbMWu7rQYlBQcBiT6rprG8autKPcz5nMzzZ:YTvC/MTQYxsWR7autz

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks