General

  • Target

    89A630080AAAD5154B8900721033B9BB65CE27BEEB389D50EE50B216FB394871

  • Size

    100.0MB

  • Sample

    250103-jpmctsxpfn

  • MD5

    b8a6ae8a737a421280af1f04ee30ac09

  • SHA1

    3ca3e1e980eb13a788f6ca1ada931f2410951b6f

  • SHA256

    89a630080aaad5154b8900721033b9bb65ce27beeb389d50ee50b216fb394871

  • SHA512

    5798d3456272082508252fd264026c20df6aeab46070ba3af4f88789d51099a066bff22988d7813cf701ba5895154823b876596e93f69a5a4c005e1fbd216843

  • SSDEEP

    24576:cqDEvCTbMWu7rQYlBQcBiT6rprG8aoKXCoEDiMWJy7:cTvC/MTQYxsWR7aoKXC1in

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.ultraflex.com.mx
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Jgj8-p4Z]a1b

Targets

    • Target

      89A630080AAAD5154B8900721033B9BB65CE27BEEB389D50EE50B216FB394871

    • Size

      100.0MB

    • MD5

      b8a6ae8a737a421280af1f04ee30ac09

    • SHA1

      3ca3e1e980eb13a788f6ca1ada931f2410951b6f

    • SHA256

      89a630080aaad5154b8900721033b9bb65ce27beeb389d50ee50b216fb394871

    • SHA512

      5798d3456272082508252fd264026c20df6aeab46070ba3af4f88789d51099a066bff22988d7813cf701ba5895154823b876596e93f69a5a4c005e1fbd216843

    • SSDEEP

      24576:cqDEvCTbMWu7rQYlBQcBiT6rprG8aoKXCoEDiMWJy7:cTvC/MTQYxsWR7aoKXC1in

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks