General

  • Target

    cf0e9b600ad0423f919ca88086246c29c548444f6d0d193bb238b7fbc513d2fb.rar

  • Size

    559KB

  • Sample

    240905-hr2d4awdnf

  • MD5

    970e94c58009238333ab475eb029e947

  • SHA1

    81bbdd97d248d2c7c60a7da05b37a1406d82b784

  • SHA256

    cf0e9b600ad0423f919ca88086246c29c548444f6d0d193bb238b7fbc513d2fb

  • SHA512

    b07f65c3d1f93cbe7ba26874a2837477936ee73f6086f9565703d7641d8d52c91de5efcb4f04e7331dea151c50c6e260e2d98ef845f764d20e662afdf1321e51

  • SSDEEP

    12288:zd3HHZpCkQR+9Nka0IEsAoOxwBoj0QDsq8TjABUY8TC5bDtgsXfBL:h3HXQZa0IEjbWoAQDs5TckC5lP9

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.ultraflex.com.mx
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Jgj8-p4Z]a1b

Targets

    • Target

      aplicação de cotação.exe

    • Size

      584KB

    • MD5

      0c39690ccaf6423656511f70f786f69b

    • SHA1

      a18ca5f0aceadb3d439d503dd4e7a3da5ae27e4f

    • SHA256

      7b0781645e52ad2c61df1c8b67d9d5748666f5d2f2664432bb506b4da0436637

    • SHA512

      e582516605f628ec4ef1be65470249a27428f4ed2c8e687c896610f12dacb02fc1ff395f14af7cb45480a4ff16ed5ed532cd65065ceac3c6b048829f1d5b20f9

    • SSDEEP

      12288:8YV6MorX7qzuC3QHO9FQVHPF51jgctJhSCx4ye5nEhrXqQwngIDHPI:bBXu9HGaVH8Cle5EhWQmgoPI

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks