General

  • Target

    458607d64c6d19bf71d7e88cd3fe61ba9c127eb5b20487b96679d7d13458c1df

  • Size

    526KB

  • Sample

    241218-bgrzcawjgz

  • MD5

    9e1e3c2f95793fa4ba283340e553da43

  • SHA1

    91bd166e29c9e802ab5481953ce2fbc8eab10b64

  • SHA256

    458607d64c6d19bf71d7e88cd3fe61ba9c127eb5b20487b96679d7d13458c1df

  • SHA512

    aaa0c8154b16587f21eace80c8c509c3aaa3726dcd904656828d63f58813a5edbdcbc3459fc998cb230c0a621416cb63ffddb7b4ace84cb3f7c7b8fd72407950

  • SSDEEP

    12288:oAYstGlEkf+gxWl/1KE/Z3haHJWHTMdbwrk2UOnvNBQyF1ojdo:o2tG+kfXxWl/sYZTHLo2HNSyao

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    -GN,s*KH{VEhPmo)+f

Targets

    • Target

      facturas vencidas, 3445650098, 0099, 00976, 009668, 009678, 0056598433.exe

    • Size

      551KB

    • MD5

      1fd2a122f365f699c69d0766b8ceab1e

    • SHA1

      5c52d1db9d4b5881f5abf337b63720acddcaaff4

    • SHA256

      6aa9264537be17d166a1a5216f8efffb0c674f8ca6cdc15996c12da7c6ca33bd

    • SHA512

      0754447c235d16becb5cfe115d637176f9aa7d79ae65862dda9cbeeaf90095833a4348de2061733126448b812ba85851d4066ef918525815f728a5ccf5c5fe5b

    • SSDEEP

      12288:/quErHF6xC9D6DmR1J98w4oknqOOCyQfnVP3gH4ssNlmqO2lyMgIVFY57:Grl6kD68JmlotQfVvY4dFO2y

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks