General

  • Target

    7c11ccc1701800c57b435767bc27bf966b88c66e0df0dd220d9f3e6bde634367.exe

  • Size

    795KB

  • Sample

    241009-pnxeasyfkf

  • MD5

    ee0294a5a3aa7e9dd2b51f1a02b69a49

  • SHA1

    210c4b6a15a7d851c8af06e8284f23fcfc4d15cb

  • SHA256

    7c11ccc1701800c57b435767bc27bf966b88c66e0df0dd220d9f3e6bde634367

  • SHA512

    8c5327cfd4b2f0290a2210f9cb4fd98b18d557217d78975fc96e1d08e3c66fae27c92672c6d75078e0f9862cb6ccc1b6e23111c4f8ecdb12f741e499515c0e7e

  • SSDEEP

    12288:v6Wq4aaE6KwyF5L0Y2D1PqLJAMC8VLO8HSB/139W5tsRXszKW1M7d4/Qhe:tthEVaPqLJj/OsSBtMuszze7EQ8

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    -GN,s*KH{VEhPmo)+f

Targets

    • Target

      7c11ccc1701800c57b435767bc27bf966b88c66e0df0dd220d9f3e6bde634367.exe

    • Size

      795KB

    • MD5

      ee0294a5a3aa7e9dd2b51f1a02b69a49

    • SHA1

      210c4b6a15a7d851c8af06e8284f23fcfc4d15cb

    • SHA256

      7c11ccc1701800c57b435767bc27bf966b88c66e0df0dd220d9f3e6bde634367

    • SHA512

      8c5327cfd4b2f0290a2210f9cb4fd98b18d557217d78975fc96e1d08e3c66fae27c92672c6d75078e0f9862cb6ccc1b6e23111c4f8ecdb12f741e499515c0e7e

    • SSDEEP

      12288:v6Wq4aaE6KwyF5L0Y2D1PqLJAMC8VLO8HSB/139W5tsRXszKW1M7d4/Qhe:tthEVaPqLJj/OsSBtMuszze7EQ8

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks