General

  • Target

    d60bc8926d26690b9b63779522e6a1a8184af57157a6b7ed64ba3e7462d79a51

  • Size

    110.0MB

  • Sample

    241011-pdcbdawgpj

  • MD5

    faef7c0bde024c682689870310101305

  • SHA1

    62841a891ac76e78cd08a0910331e7f3a708fefc

  • SHA256

    d60bc8926d26690b9b63779522e6a1a8184af57157a6b7ed64ba3e7462d79a51

  • SHA512

    127c49c5bc1a503299c0ec6fcb69f60e6e1335f76acee7c0a12c5ccf8ebd268020174d9d8c48e19a9d7c9aedc9e86d870fe9c9ee233bb1e7157a32aae05d81f1

  • SSDEEP

    24576:cCdxte/80jYLT3U1jfsWaWADjQ7QXNG++yCtZaS/rZ1YTjhQWv0KoAoQ:dw80cTsjkWaWUXI+Zr0YhQy9v

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.solucionesmexico.mx
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    dGG^ZYIxX5!B

Targets

    • Target

      d60bc8926d26690b9b63779522e6a1a8184af57157a6b7ed64ba3e7462d79a51

    • Size

      110.0MB

    • MD5

      faef7c0bde024c682689870310101305

    • SHA1

      62841a891ac76e78cd08a0910331e7f3a708fefc

    • SHA256

      d60bc8926d26690b9b63779522e6a1a8184af57157a6b7ed64ba3e7462d79a51

    • SHA512

      127c49c5bc1a503299c0ec6fcb69f60e6e1335f76acee7c0a12c5ccf8ebd268020174d9d8c48e19a9d7c9aedc9e86d870fe9c9ee233bb1e7157a32aae05d81f1

    • SSDEEP

      24576:cCdxte/80jYLT3U1jfsWaWADjQ7QXNG++yCtZaS/rZ1YTjhQWv0KoAoQ:dw80cTsjkWaWUXI+Zr0YhQy9v

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks