General

  • Target

    06301263928aaec71a3c2934152b90dedb62fa85479fbb4aba8aee0ebe5d4aa8

  • Size

    1.0MB

  • Sample

    240701-bhv3ds1fre

  • MD5

    bdb74cddc8dccecb53da0facf023752e

  • SHA1

    d4c935ce295d4c4662c2616e3ab8f1e0fcb5b0ce

  • SHA256

    06301263928aaec71a3c2934152b90dedb62fa85479fbb4aba8aee0ebe5d4aa8

  • SHA512

    0838291d08a5feed9df89e4d281272f5380272cccccc423c15a5877e930e2a6b6b9a4f05492f76f6dacc2ce0ffa113155965424027d04a44f5b83c43c8a16014

  • SSDEEP

    24576:3AHnh+eWsN3skA4RV1Hom2KXMmHaL/QQhh5KGfV5:qh+ZkldoPK8YaL/Qn4

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.solucionesmexico.mx
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    dGG^ZYIxX5!B

Targets

    • Target

      06301263928aaec71a3c2934152b90dedb62fa85479fbb4aba8aee0ebe5d4aa8

    • Size

      1.0MB

    • MD5

      bdb74cddc8dccecb53da0facf023752e

    • SHA1

      d4c935ce295d4c4662c2616e3ab8f1e0fcb5b0ce

    • SHA256

      06301263928aaec71a3c2934152b90dedb62fa85479fbb4aba8aee0ebe5d4aa8

    • SHA512

      0838291d08a5feed9df89e4d281272f5380272cccccc423c15a5877e930e2a6b6b9a4f05492f76f6dacc2ce0ffa113155965424027d04a44f5b83c43c8a16014

    • SSDEEP

      24576:3AHnh+eWsN3skA4RV1Hom2KXMmHaL/QQhh5KGfV5:qh+ZkldoPK8YaL/Qn4

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks