General

  • Target

    20092024_0140_17092024_comprobante_swift0000099.uu

  • Size

    812KB

  • Sample

    240920-b3j6masgqn

  • MD5

    20abeae52a48206210e167065304b09b

  • SHA1

    7eac10701418a0d95483487293f8efba309b17bb

  • SHA256

    684729b66bdeca51b3e40486a241ad0f2c6312fddf84b0b04a1300a8171cf658

  • SHA512

    02ad96db39b70ab4708b793f17b9750db9877886fb82a585dc013ac61aab7cd590522d3f872a2ee2600a92d7ac8d18006f2120efdac141d1182ef750ae474a77

  • SSDEEP

    12288:gTr/vdlbDnT0cudvkUeJ6N6XK324SWjWLnAexmoTEHWEiFCHVqdkXoP2ZxoVcMYo:Er/llbDMdvhq6G427TgWP8YkXQncDo

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    -GN,s*KH{VEhPmo)+f

Targets

    • Target

      comprobante_swift0000099.exe

    • Size

      826KB

    • MD5

      4e94db0febef97c25d47b2efa4f8e5f3

    • SHA1

      8ee81611a5fa3ba4f7c572556c4d25be98edc934

    • SHA256

      20248a7006d2050da17a84baba48dc66149667ca24c79efbf71ceef6e10a27f5

    • SHA512

      bafd1a65bfdb0d6425a00a0656f611ab3a152ec710604ce7ca63708bfd2bdc78ce105088e07d7361c9a657b422f3a78d6450b379a0e6425823b3e60e14eb922e

    • SSDEEP

      12288:v6Wq4aaE6KwyF5L0Y2D1PqLekmmpS2/V12BWr1BtqpZbXPf+bj7uD9/t3RMfaMCy:tthEVaPqLampSQLAZrPuujMH

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks