General

  • Target

    SME940805NE7_Orden de compra_2866_20250117.uu

  • Size

    541KB

  • Sample

    250120-sdn7qavmb1

  • MD5

    6587c28843f9ff45eac85bb5bcf46fe7

  • SHA1

    7e3b2d917af9c956155fe199fdb749643f23087f

  • SHA256

    b33fab14654abd45db80294619ae0f63536e39ded9f7c8dd398ef8604b3a459e

  • SHA512

    4f569440e10d699da6f3da492b21d8b1c4b3b9cc262fc1c371c52b702446517859b101c23d4f2d1b38ebdd207ff37a6609c65c394619343c54d226ba5ae5a425

  • SSDEEP

    12288:FU/aKDtOaTiMfSv4MXKWILT8Pjz3QAn6ySp01a8ndR5yTCQ:FipxOawg+K70jz3Q+6Zpb8ndRcR

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.solucionesmexico.mx
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    dGG^ZYIxX5!B

Targets

    • Target

      SME940805NE7_Orden de compra_2866_20250117.exe

    • Size

      1.0MB

    • MD5

      e7a41d3a6376d834e88548ca8e2d5187

    • SHA1

      0ac56ad806f92ad780ff4e64e8610b102944aabe

    • SHA256

      72c492c3198f103c677df4abbbfcfc96a3f43126d9f8ef6426cd74e879405524

    • SHA512

      20e18f647a2e227b4c44a564037f744de3b6d6b4c2a9ef0a983f74451e1e9f564334ee4ecdaefa981bcb1a1cf911e2260ea15a65c13140188ee2bc7bfb27757b

    • SSDEEP

      12288:1CdOy3vVrKxR5CXbNjAOxK/j2n+4YG/6c1mFFja3mXgcjfRlgsUBgaOTeV0tHJKF:1Cdxte/80jYLT3U1jfsWa2eVLTLL+Q

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks