General

  • Target

    5e34622fdca5524fe4ab7eb074a4499cdfca5a9c34a16e3cda717944463a24a9

  • Size

    1010KB

  • Sample

    241119-bxqffsylay

  • MD5

    7c375db5f3cc3aebd830e61e7d23e298

  • SHA1

    5e8bd173e02398f7ca27e539eedb85a8431cd7d7

  • SHA256

    5e34622fdca5524fe4ab7eb074a4499cdfca5a9c34a16e3cda717944463a24a9

  • SHA512

    7ebf01ef8fbd6d216a116a41a9c10adb9720c9c303b4b4eabda209106f699692ee2ff0cd3eab29409f46b2278e395c85e810e12e3a62bc1fb208ceab3a21bec1

  • SSDEEP

    24576:eu6J33O0c+JY5UZ+XC0kGso6FaubkdPV0J6K1WY:wu0c++OCvkGs9FaubUAkY

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    4r@d15PS!-!h

Targets

    • Target

      5e34622fdca5524fe4ab7eb074a4499cdfca5a9c34a16e3cda717944463a24a9

    • Size

      1010KB

    • MD5

      7c375db5f3cc3aebd830e61e7d23e298

    • SHA1

      5e8bd173e02398f7ca27e539eedb85a8431cd7d7

    • SHA256

      5e34622fdca5524fe4ab7eb074a4499cdfca5a9c34a16e3cda717944463a24a9

    • SHA512

      7ebf01ef8fbd6d216a116a41a9c10adb9720c9c303b4b4eabda209106f699692ee2ff0cd3eab29409f46b2278e395c85e810e12e3a62bc1fb208ceab3a21bec1

    • SSDEEP

      24576:eu6J33O0c+JY5UZ+XC0kGso6FaubkdPV0J6K1WY:wu0c++OCvkGs9FaubUAkY

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks