General

  • Target

    fc7c241bd2d7edf961b8f1af19fc80419d239c67d72a8eb0610152f1e67841d1.exe

  • Size

    1.1MB

  • Sample

    241010-kp9c2axhjp

  • MD5

    e82e1bdc0bc846ada3f51d89793e3871

  • SHA1

    718ca217a72bb71f132ea64b11a596ad442e6e3b

  • SHA256

    fc7c241bd2d7edf961b8f1af19fc80419d239c67d72a8eb0610152f1e67841d1

  • SHA512

    54085c14b1e3a8605abb252589d812bb884fe776c2547dcc09bfd3571c0853dafe00d45da2affec6a7e449ec2523f4d0608cef4576e3a7c8867096d9297e3655

  • SSDEEP

    24576:LRmJkcoQricOIQxiZY1WNylBfPS5+7TZx0Hp+y3nowYCDj:IJZoQrbTFZY1WNyDfPNTZGgy3nTvf

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    -GN,s*KH{VEhPmo)+f

Targets

    • Target

      fc7c241bd2d7edf961b8f1af19fc80419d239c67d72a8eb0610152f1e67841d1.exe

    • Size

      1.1MB

    • MD5

      e82e1bdc0bc846ada3f51d89793e3871

    • SHA1

      718ca217a72bb71f132ea64b11a596ad442e6e3b

    • SHA256

      fc7c241bd2d7edf961b8f1af19fc80419d239c67d72a8eb0610152f1e67841d1

    • SHA512

      54085c14b1e3a8605abb252589d812bb884fe776c2547dcc09bfd3571c0853dafe00d45da2affec6a7e449ec2523f4d0608cef4576e3a7c8867096d9297e3655

    • SSDEEP

      24576:LRmJkcoQricOIQxiZY1WNylBfPS5+7TZx0Hp+y3nowYCDj:IJZoQrbTFZY1WNyDfPNTZGgy3nTvf

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks