General

  • Target

    813ed1ec6506951c414a1adfd24e6f4660c33e79b5790045a02404787e00b3d9

  • Size

    834KB

  • Sample

    250109-bh1yms1pbv

  • MD5

    466c5b6f2d24de81467ecbdea1ca0688

  • SHA1

    1371271f6312c737f138382290132321d6f9842c

  • SHA256

    813ed1ec6506951c414a1adfd24e6f4660c33e79b5790045a02404787e00b3d9

  • SHA512

    4b4a238b3c05b323d6a74698b4f60a305b055ea477e23cd44405ae71a628df25c7856255692817680c64d2f2cce6401b3db72cf0d7345a3d2559a5b0580d8563

  • SSDEEP

    24576:S0haTfRHl1FWVyUgM9lNvJ+0yoFzJ4dtlCHK:S0G3oVyUTpv7yod4WK

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.fosna.net
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    (=8fPSH$KO_!

Targets

    • Target

      transferencia_BBVA_97866456345354678976543425678.exe

    • Size

      858KB

    • MD5

      5625cbf471e51e71ede214a1236ca612

    • SHA1

      d07a68d0d95ad9855d096e3e8ea680e31afd7e7f

    • SHA256

      e5b6cda78a342ea9f8f9f62853995a251ef13ce90dbd18a80195f460852a94e6

    • SHA512

      2fe51828e092723dad0add4601c01279478c34af3cdee530bc03005ef912e8e438b584b45cbdb7b6682d4a14b801267835f65f4b4b1edf477093fbf11ea4d090

    • SSDEEP

      24576:5iUmSB/o5d1ubcvi0X6qMhXRqOyzrNMZBZT:5/mU/ohubcvi9xXk1zpMZB

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks