General

  • Target

    0d82ed43d37d9117aecf438f7272c0ae813a9e2409dfa9208f6bec32c4c04c90

  • Size

    1012KB

  • Sample

    241219-bfktms1kel

  • MD5

    6f640d1ceab80ee248a446051cc5765b

  • SHA1

    352ef2b0232e8530143e010ad155883eff2608ab

  • SHA256

    0d82ed43d37d9117aecf438f7272c0ae813a9e2409dfa9208f6bec32c4c04c90

  • SHA512

    5d515b12610fe24f7bc7631308bf4c6e51139d08887e9edce87766e69f6092f629c4c98c41fbb607eefa7c16eb2553c871b9892339bb3f9b11b57678bb11f5b0

  • SSDEEP

    24576:Wu6J33O0c+JY5UZ+XC0kGsoTCcYvN3naydWY:4u0c++OCvkGsECcYFngY

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    -GN,s*KH{VEhPmo)+f

Targets

    • Target

      0d82ed43d37d9117aecf438f7272c0ae813a9e2409dfa9208f6bec32c4c04c90

    • Size

      1012KB

    • MD5

      6f640d1ceab80ee248a446051cc5765b

    • SHA1

      352ef2b0232e8530143e010ad155883eff2608ab

    • SHA256

      0d82ed43d37d9117aecf438f7272c0ae813a9e2409dfa9208f6bec32c4c04c90

    • SHA512

      5d515b12610fe24f7bc7631308bf4c6e51139d08887e9edce87766e69f6092f629c4c98c41fbb607eefa7c16eb2553c871b9892339bb3f9b11b57678bb11f5b0

    • SSDEEP

      24576:Wu6J33O0c+JY5UZ+XC0kGsoTCcYvN3naydWY:4u0c++OCvkGsECcYFngY

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks