General

  • Target

    5a95f1def14ec3400bc2a7b4c23872e88d95519d2a2dc4b8de632584c2447a8d.rar

  • Size

    587KB

  • Sample

    240905-brfdas1fkb

  • MD5

    0720fe8bd8ae04b20335e7f74aab4937

  • SHA1

    506547ef5ea8a36b2cf9bdad4204c7fc45849e12

  • SHA256

    5a95f1def14ec3400bc2a7b4c23872e88d95519d2a2dc4b8de632584c2447a8d

  • SHA512

    02ed049ddd5566aa080f491b515e6440d9cb70b096ebcbb2cb2c5b291c2f0cc1e7d2fa879a1de2f5efe9dc7f3ac11eb955f2f91d22adc5423f78229418e781d1

  • SSDEEP

    12288:8XmX5oenJrGyaaGq2YTzBWepEdC8C1PC5zxYC4shRz6mdrsorLMwo:8QnJrjHN/H1EU8CA3YzsXz6mdrfLMr

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.solucionesmexico.mx
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    dGG^ZYIxX5!B

Targets

    • Target

      aplicação de cotação.exe

    • Size

      1.1MB

    • MD5

      eb5ba52c5fbc1efa1d7e3c7d9364654e

    • SHA1

      fa088e270c9df961788001611785051280fbd09c

    • SHA256

      a419ccaf4f503aca90a05b8e2bb16f85e691c36d5fd4847be5d48db9cb5641f4

    • SHA512

      2facede2a967280d728111190ce0d4c3ea6cc20cb0e4079368976c98bb673807242c52a44261fd3164a35f5f19acf16c2e98fdceb18112b07f986243d435dbe4

    • SSDEEP

      24576:YqDEvCTbMWu7rQYlBQcBiT6rprG8autKPcz5nMzzZ:YTvC/MTQYxsWR7autz

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks