General

  • Target

    34a592414a902d096243319006d5fadd5e3b41dc4f0e299d3fb33d25b7ab64d6

  • Size

    535KB

  • Sample

    241121-bhp65sxapa

  • MD5

    d45d38c56b0d48886251f35534cc4c21

  • SHA1

    bcdbd9a77affe05ca7a54710769af4f1a7a71ada

  • SHA256

    34a592414a902d096243319006d5fadd5e3b41dc4f0e299d3fb33d25b7ab64d6

  • SHA512

    450d1df6dad5ec8000983ff48a561cbba03892a19d1e7cd5a53e08131766137e0964344e55167301de2926435f95b4d67ba9f52f79766d885a6c2c98be4d9a59

  • SSDEEP

    12288:SC2vUzXs6YubDEBtHY1+Xl8Ft8IaubT16/s:SC2vUzc6YUDEBt4wXl0t1aubTl

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.fosna.net
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    =A+N^@~c]~#I

Targets

    • Target

      TRANSFERENCIA BANCA ELECTRONICA_9786.exe

    • Size

      1020KB

    • MD5

      ec54ec96f798986e11e21ae30143d86f

    • SHA1

      08d5f0df9b9b930df3239dd7d3708f2657c9bf7a

    • SHA256

      ee135e88c1e612f8298bbd73b83b6276e3654a1dfdbc92bfd0a58357d69ad9a3

    • SHA512

      0299e4043aa6b130a75aa6b86ce268a9be6729e0daadf6fec079a76fddaa29e1bc85c9f21c0829703ef7ffa8d138f99a8bbd3c81a0fce5d84ec6588ac3095d37

    • SSDEEP

      24576:ju6J33O0c+JY5UZ+XC0kGso6Faku/9ASEiGOLbnWY:tu0c++OCvkGs9Faku/KPLiiY

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks