General

  • Target

    7f6c6ea6eba170a6d162182bbb4b16da9d6125716a0ceb31e7d4af4e666f8d3b.exe

  • Size

    99.0MB

  • Sample

    241011-n9rkha1dpg

  • MD5

    3e92a9242c1347f9924b1d6631d27163

  • SHA1

    d9d5b557835fb6b1f797e352f441930053f38e76

  • SHA256

    7f6c6ea6eba170a6d162182bbb4b16da9d6125716a0ceb31e7d4af4e666f8d3b

  • SHA512

    90a38196ae610fc2d546e0cd60d936762ea95f89cd1847adc18498ffd2dbbad3bf3cb7fcf39ca08963cb0fc89631ecf59db9cb8c6422f3d2b0caf87b672c260a

  • SSDEEP

    24576:54GHnhIzOaW8Aweki81o2UiEAFmOtsXPxU0155cCW:OshdazA/k/7UiEAFmOG5Uq3

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.controlfire.com.mx
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    0a4XlE=4t8mz

Targets

    • Target

      7f6c6ea6eba170a6d162182bbb4b16da9d6125716a0ceb31e7d4af4e666f8d3b.exe

    • Size

      99.0MB

    • MD5

      3e92a9242c1347f9924b1d6631d27163

    • SHA1

      d9d5b557835fb6b1f797e352f441930053f38e76

    • SHA256

      7f6c6ea6eba170a6d162182bbb4b16da9d6125716a0ceb31e7d4af4e666f8d3b

    • SHA512

      90a38196ae610fc2d546e0cd60d936762ea95f89cd1847adc18498ffd2dbbad3bf3cb7fcf39ca08963cb0fc89631ecf59db9cb8c6422f3d2b0caf87b672c260a

    • SSDEEP

      24576:54GHnhIzOaW8Aweki81o2UiEAFmOtsXPxU0155cCW:OshdazA/k/7UiEAFmOG5Uq3

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks