General

  • Target

    523c3e9f716ca9f2a75109f674135b55e9b25259d5d078175fb5580965426f8a.exe

  • Size

    1.1MB

  • Sample

    250111-dq5ynstncp

  • MD5

    aa3e95c2cd9e5118dfe41280d0e05a49

  • SHA1

    5261a60d04c74f986cdd6f129a171874b446d8b2

  • SHA256

    523c3e9f716ca9f2a75109f674135b55e9b25259d5d078175fb5580965426f8a

  • SHA512

    11564a40439aef33bcf205690bb18d4a29f995b4b063c6aea1e717a0e5334695c9d20875b686cfc29b03a8d545ffd370450c19acdbc174a008162e28e0d7e670

  • SSDEEP

    24576:LRmJkcoQricOIQxiZY1WNy0NiyOPxaosPXuBDytC:IJZoQrbTFZY1WNyeQPxarPXI9

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    -GN,s*KH{VEhPmo)+f

Targets

    • Target

      523c3e9f716ca9f2a75109f674135b55e9b25259d5d078175fb5580965426f8a.exe

    • Size

      1.1MB

    • MD5

      aa3e95c2cd9e5118dfe41280d0e05a49

    • SHA1

      5261a60d04c74f986cdd6f129a171874b446d8b2

    • SHA256

      523c3e9f716ca9f2a75109f674135b55e9b25259d5d078175fb5580965426f8a

    • SHA512

      11564a40439aef33bcf205690bb18d4a29f995b4b063c6aea1e717a0e5334695c9d20875b686cfc29b03a8d545ffd370450c19acdbc174a008162e28e0d7e670

    • SSDEEP

      24576:LRmJkcoQricOIQxiZY1WNy0NiyOPxaosPXuBDytC:IJZoQrbTFZY1WNyeQPxarPXI9

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks