General

  • Target

    SOLICITUD DE PAGO.gzh

  • Size

    780KB

  • Sample

    241014-qwxkpsscjj

  • MD5

    b4db119be3f682831d1064231e10b012

  • SHA1

    94bcf8bacc7713ddfadeeb1ddc087eeb3cb5bb0b

  • SHA256

    7d9ff3fda3b7f5805638e2d71df6edf497be9c0d455e57c9be2ddf388ce05573

  • SHA512

    399ac6a6407883f48ad7d311b037f72649648e6e7dc818397a7b146e46b81e946abb31bf1cb2bef46e9af51d0d5d6a4297e1c35e6e3390b9349ef973ca72569e

  • SSDEEP

    24576:82rcKPRQQFvUpCqQ/NgsXZatn5f2vft9THf+5iTE0Aet:+KPRQQCegyat8n7rwiSet

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.ultraflex.com.mx
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Jgj8-p4Z]a1b

Targets

    • Target

      SOLICITUD DE PAGO.exe

    • Size

      804KB

    • MD5

      eca6e5d1b6da0957d7a179605977c7f3

    • SHA1

      f3d3cdc9b1ac8bdfd092e718c264cb291e73f99e

    • SHA256

      b4337365f4919ca5330d2da47e51e60f343f0aef026410790a94e30f289cea0e

    • SHA512

      9150f1f1dbc635317390bd9503928247c0ab75df66cb00a41061daae4e8ca40f00e2dc85c0cd6bb9bb65172077b57cc078e81ba2b2f177ad45e18a73bafc6c86

    • SSDEEP

      24576:jq5TfcdHj4fmbvl2B16spQwmi4t154I+1xlS:jUTsambzcn4Lm1xl

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks