General

  • Target

    ee1fa2339cd9e8abb1b7a19f92d9e1f66e174cb8a280614e3162160a2b927bf3

  • Size

    76.0MB

  • Sample

    241011-pfy8xswhpr

  • MD5

    b1b54b694a9df20a81213a8d00577966

  • SHA1

    a4e977867bc7e3d61e37590a9c4d00e61ce75bb1

  • SHA256

    ee1fa2339cd9e8abb1b7a19f92d9e1f66e174cb8a280614e3162160a2b927bf3

  • SHA512

    4fbf93dd1ccf14748fff93cfde716f68da255d5cc91b917dacf58dbba1abfb9b599ac97a96bac8679e09638e0b4cbfed3f8a0427360c5ff8dc21ae9a839c8c5a

  • SSDEEP

    24576:Qtb20pkaCqT5TBWgNQ7aSCk+Zt8OR1pLSfvp6A:ZVg5tQ7aS+7lfRSp5

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.controlfire.com.mx
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    0a4XlE=4t8mz

Targets

    • Target

      ee1fa2339cd9e8abb1b7a19f92d9e1f66e174cb8a280614e3162160a2b927bf3

    • Size

      76.0MB

    • MD5

      b1b54b694a9df20a81213a8d00577966

    • SHA1

      a4e977867bc7e3d61e37590a9c4d00e61ce75bb1

    • SHA256

      ee1fa2339cd9e8abb1b7a19f92d9e1f66e174cb8a280614e3162160a2b927bf3

    • SHA512

      4fbf93dd1ccf14748fff93cfde716f68da255d5cc91b917dacf58dbba1abfb9b599ac97a96bac8679e09638e0b4cbfed3f8a0427360c5ff8dc21ae9a839c8c5a

    • SSDEEP

      24576:Qtb20pkaCqT5TBWgNQ7aSCk+Zt8OR1pLSfvp6A:ZVg5tQ7aS+7lfRSp5

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks