General

  • Target

    d5067337a0b44dda20a729a4587ce5835c5b8082b7b7933ef7d99c414f47b658

  • Size

    1.0MB

  • Sample

    241123-cczn3a1ldp

  • MD5

    35b3ed0845fbb6e627b35af7c11f9cb4

  • SHA1

    7a092074bbeb8e20559b7a7a9d45d074723d60fc

  • SHA256

    d5067337a0b44dda20a729a4587ce5835c5b8082b7b7933ef7d99c414f47b658

  • SHA512

    7e519d04b9a67f2a51843212b5a27ce3fd9c5cc26d0d7276b03f5f7a112db243bcf1d91e3cdc388d7922c2844f1005e2a2098bcfbbe182eee114fb0618521b12

  • SSDEEP

    24576:utb20pkaCqT5TBWgNQ7agNhP2kJqu2YK6A:bVg5tQ7agNh+0qr5

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    -GN,s*KH{VEhPmo)+f

Targets

    • Target

      d5067337a0b44dda20a729a4587ce5835c5b8082b7b7933ef7d99c414f47b658

    • Size

      1.0MB

    • MD5

      35b3ed0845fbb6e627b35af7c11f9cb4

    • SHA1

      7a092074bbeb8e20559b7a7a9d45d074723d60fc

    • SHA256

      d5067337a0b44dda20a729a4587ce5835c5b8082b7b7933ef7d99c414f47b658

    • SHA512

      7e519d04b9a67f2a51843212b5a27ce3fd9c5cc26d0d7276b03f5f7a112db243bcf1d91e3cdc388d7922c2844f1005e2a2098bcfbbe182eee114fb0618521b12

    • SSDEEP

      24576:utb20pkaCqT5TBWgNQ7agNhP2kJqu2YK6A:bVg5tQ7agNh+0qr5

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks