General

  • Target

    ea9f7433c61ed483a0293ce78d8e37e9caa791c71a7527afe9a3f8093b151889

  • Size

    879KB

  • Sample

    241016-dzb2yszfqc

  • MD5

    b57fbe0a314951226c6127464f761a0b

  • SHA1

    63bda873e2b8a5c9361f31c992537fe9c55b2653

  • SHA256

    ea9f7433c61ed483a0293ce78d8e37e9caa791c71a7527afe9a3f8093b151889

  • SHA512

    98b227c62bf513794011c05010f80472c2c8cea4f4fd9b2477cb40d3c98bd8aa57c9cd44b7dc769c6691c275534cf36a610319da6e9c4b11681457b68d33a458

  • SSDEEP

    24576:wPjfYKO13GnKAuxZP3HP4SUQEFY1BvZmTA1V25sO:w7fYKQW90P3HOFQsAWsO

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.ercolina-usa.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    uy,o#mZj8$lY

Targets

    • Target

      LISTA DE COTIZACIONES.exe

    • Size

      1.2MB

    • MD5

      9e0277fc96f86accaa6dbf0fe729c0dc

    • SHA1

      8b3425a0441f56f37a20b81a9dd023fc83abb06f

    • SHA256

      3de2d235de3dd1488d4405382c3498030d84ff10c0ce04597f2e8151bd92efff

    • SHA512

      519b8f9634b1c1662d2fae60a1bcba670f2966317fa5d67469bc8dc4983fb8fae806a8acbd79e195c98b4ff8fda39bf1ff47adb8d873bcc6fd7a288751d8ee80

    • SSDEEP

      24576:WfmMv6Ckr7Mny5Q6nwI0K/FbcxA24XJnqToZUMBYA1jDg:W3v+7/5Q6LjGA24ZOWDg

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks