General

  • Target

    92c5d005c4454ff4be8093157b6f5d5cb11e7254fb3f979ffdddf167e464955f.exe

  • Size

    1.0MB

  • Sample

    241121-hn73gaygnh

  • MD5

    61bdc143810dff5cb798e3b005b6331c

  • SHA1

    d4353ab7ad96db756d9d7e93e9bcc9d1f97c629c

  • SHA256

    92c5d005c4454ff4be8093157b6f5d5cb11e7254fb3f979ffdddf167e464955f

  • SHA512

    0074fcbe88119f522a33a61282b156bdcabca62e6948f89561ba6d17864c24b21349683c0396d72ed0d6e8eba82ddb755119358b7b4dba76e295e3b5cf3d8cc1

  • SSDEEP

    12288:Htb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNuPPpHSgaSTUqpKVjfgiJ6A:Htb20pkaCqT5TBWgNQ7ayUMglJ6A

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    -GN,s*KH{VEhPmo)+f

Targets

    • Target

      92c5d005c4454ff4be8093157b6f5d5cb11e7254fb3f979ffdddf167e464955f.exe

    • Size

      1.0MB

    • MD5

      61bdc143810dff5cb798e3b005b6331c

    • SHA1

      d4353ab7ad96db756d9d7e93e9bcc9d1f97c629c

    • SHA256

      92c5d005c4454ff4be8093157b6f5d5cb11e7254fb3f979ffdddf167e464955f

    • SHA512

      0074fcbe88119f522a33a61282b156bdcabca62e6948f89561ba6d17864c24b21349683c0396d72ed0d6e8eba82ddb755119358b7b4dba76e295e3b5cf3d8cc1

    • SSDEEP

      12288:Htb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNuPPpHSgaSTUqpKVjfgiJ6A:Htb20pkaCqT5TBWgNQ7ayUMglJ6A

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks