General

  • Target

    a7ddda8e43d03d462a05c4c686921217368b407fe7f2cd8cabbcdb8e49f2f6c4

  • Size

    1.3MB

  • Sample

    241116-bjk9ksxanr

  • MD5

    b7e0f937a3fdd954b4998c7d34c75861

  • SHA1

    4e175642f5cae958cfc3d03bdd882aabc954f19c

  • SHA256

    a7ddda8e43d03d462a05c4c686921217368b407fe7f2cd8cabbcdb8e49f2f6c4

  • SHA512

    699343f44368444f2d7d7e7777ad79270c8afa4cb73390d68d3a6f395d8a235c43fedd5c775c1f241f8747e5e4cbefb3866703591625dcd7fcf58dc5e1536519

  • SSDEEP

    24576:Jtb20pkaCqT5TBWgNjVY5ltWxmwSE1fR9DIVxa25c9vaKV6A:aVg5tjVY5lCpDIavx5

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.solucionesmexico.mx
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    dGG^ZYIxX5!B

Targets

    • Target

      a7ddda8e43d03d462a05c4c686921217368b407fe7f2cd8cabbcdb8e49f2f6c4

    • Size

      1.3MB

    • MD5

      b7e0f937a3fdd954b4998c7d34c75861

    • SHA1

      4e175642f5cae958cfc3d03bdd882aabc954f19c

    • SHA256

      a7ddda8e43d03d462a05c4c686921217368b407fe7f2cd8cabbcdb8e49f2f6c4

    • SHA512

      699343f44368444f2d7d7e7777ad79270c8afa4cb73390d68d3a6f395d8a235c43fedd5c775c1f241f8747e5e4cbefb3866703591625dcd7fcf58dc5e1536519

    • SSDEEP

      24576:Jtb20pkaCqT5TBWgNjVY5ltWxmwSE1fR9DIVxa25c9vaKV6A:aVg5tjVY5lCpDIavx5

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks