General

  • Target

    8aa3ae07b9dbb1c93871683ab9182cfab41c8c7680f2d12498262e728ffc3ae5

  • Size

    522KB

  • Sample

    250123-bfyqhavkas

  • MD5

    88d9433ee99d0ab08a5d15111ebcb5f6

  • SHA1

    f60062e588af49537b938afa7c1f7a06df4ea8bb

  • SHA256

    8aa3ae07b9dbb1c93871683ab9182cfab41c8c7680f2d12498262e728ffc3ae5

  • SHA512

    bfbb5712f59e19736c537deb1b66042bf9ad66611da52f5f1b60360502b7c3fdd479f43fe5efd9fe825f9031ea801a10da757c5324f6c8c131d0c86780729f76

  • SSDEEP

    12288:FUAy2p3FI1rrLC/KRQpnNMhQksxRCaR4EGNsedUIlm/oYsT5m:SmVINlmNMCNxRCaR4EY93m/orTY

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.solucionesmexico.mx
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    dGG^ZYIxX5!B

Targets

    • Target

      COTIZACIÓN2025-003709.exe

    • Size

      547KB

    • MD5

      acb06788c73e433473a545fe83823023

    • SHA1

      4f5f29eea50f6c4b1ad966af8d0761857d3cdc95

    • SHA256

      e6ca722fb31f1c9f6db25e77b2661ffddc55d8a3a4ce2ef3be7f6c65523d7554

    • SHA512

      127f0302e2eac5d725337d22a520b35b92c821673b26f5be941eca165c41660bfefa542e0b50c5d1d582ba90d1c0c7774ee268b9f64e86df28b160a7d6ae659b

    • SSDEEP

      12288:XozGdX0M4ornOmZIzfMwHHQmRROXKWXUmd1Ph2TIoOCJRw63kLRgdbihJ:X4GHnhIzOaWXU0F4OiRPkN8cJ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks