General

  • Target

    2a6ff1cef657a6538c13bcb0608838dabf1a7d129b6f6cdec87090da94b73519

  • Size

    1022KB

  • Sample

    250123-bmwjqawlbk

  • MD5

    b5ee430dd6835a1a6d1e9bec76e042a6

  • SHA1

    475d6d6f34c14c99658a14bdcf4ff473c857bd34

  • SHA256

    2a6ff1cef657a6538c13bcb0608838dabf1a7d129b6f6cdec87090da94b73519

  • SHA512

    f8d251536fae464c7affed7c0d56109ad6ebfeaea63d063325a7be3c5ff5302fb9f215b61cbdfa8197612c192849be289cda5212ab0144e55943a0776314f6f9

  • SSDEEP

    12288:gCdOy3vVrKxR5CXbNjAOxK/j2n+4YG/6c1mFFja3mXgcjfRlgsUBgajTwgRkl6nG:gCdxte/80jYLT3U1jfsWa3nkU5EM3LQ

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.solucionesmexico.mx
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    dGG^ZYIxX5!B

Targets

    • Target

      2a6ff1cef657a6538c13bcb0608838dabf1a7d129b6f6cdec87090da94b73519

    • Size

      1022KB

    • MD5

      b5ee430dd6835a1a6d1e9bec76e042a6

    • SHA1

      475d6d6f34c14c99658a14bdcf4ff473c857bd34

    • SHA256

      2a6ff1cef657a6538c13bcb0608838dabf1a7d129b6f6cdec87090da94b73519

    • SHA512

      f8d251536fae464c7affed7c0d56109ad6ebfeaea63d063325a7be3c5ff5302fb9f215b61cbdfa8197612c192849be289cda5212ab0144e55943a0776314f6f9

    • SSDEEP

      12288:gCdOy3vVrKxR5CXbNjAOxK/j2n+4YG/6c1mFFja3mXgcjfRlgsUBgajTwgRkl6nG:gCdxte/80jYLT3U1jfsWa3nkU5EM3LQ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks