General

  • Target

    b05562606e5a2feb8c55bcb365bd44eceb3660e2e234c48a10131cc333c6b07e

  • Size

    533KB

  • Sample

    241121-btbg5askbl

  • MD5

    e8e409ae2894593f48c42de7519d5097

  • SHA1

    96adc644e287a4214af143cf9c55051e513af972

  • SHA256

    b05562606e5a2feb8c55bcb365bd44eceb3660e2e234c48a10131cc333c6b07e

  • SHA512

    b961cce0c3c5186ba4ec7f8d2bf402116f0bb4b9a04c8611c4b43142bbdd7a824ae3c1fbd4b7d8b232ae0c0e357e84c624b9403a9bce4819de9ccaa74fd96c1c

  • SSDEEP

    12288:Zua4SqQxjsGRHqJCnfVjtHSxc0MP9ayKHdm7A6Qxp4YTeoG:ZuBFQxsgHCgfmxcDP7U0IaAeZ

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.fosna.net
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    =A+N^@~c]~#I

Targets

    • Target

      pago devuelto_986754346346789076543486756457890.exe

    • Size

      558KB

    • MD5

      6e140711ff9ec49f3fa96dbe3d8647f4

    • SHA1

      2e0f7ae1f78b55f78c069c8081685a7b31671ea2

    • SHA256

      ba2172b7494a5d9f39f2961396d9f6e7a1153a6ac358548eaa01831349a028b3

    • SHA512

      f49520ec708bef0bae9f173428aedfbedebdbc5c5b2fee1725096296b25041858db35cc08d8493bac79cec045c35433d73ffb9d9fef7756e22e13065d25a1f7a

    • SSDEEP

      12288:zquErHF6xC9D6DmR1J98w4oknqOOCyQfItlN6rSDFXvzKQeL0F:Krl6kD68JmlotQfWl2A1LZeL8

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks