General

  • Target

    SOA May.xlt

  • Size

    708KB

  • Sample

    210510-k6xvw7n5yx

  • MD5

    eab9dd0c6c9970b12851dc56c8e77ebb

  • SHA1

    0ce87f1116fe287bc9415a051af23c81d27449c1

  • SHA256

    1c409fee36dda5337ef340dd480d92fbf68da68bee2a28f267def6bbb63755f6

  • SHA512

    fc619429f3ff49df839345f754ada67b35960c015b0be84289ae9aad8174142f4b6bce067bcb7babefd6aac65399806c528417329eb3dc1c87f0073e08bdb4cb

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.tractorandinas.com/
  • Port:
    21
  • Username:
    admin@tractorandinas.com
  • Password:
    ~P*xO7vPBc-o

Targets

    • Target

      SOA May.xlt

    • Size

      708KB

    • MD5

      eab9dd0c6c9970b12851dc56c8e77ebb

    • SHA1

      0ce87f1116fe287bc9415a051af23c81d27449c1

    • SHA256

      1c409fee36dda5337ef340dd480d92fbf68da68bee2a28f267def6bbb63755f6

    • SHA512

      fc619429f3ff49df839345f754ada67b35960c015b0be84289ae9aad8174142f4b6bce067bcb7babefd6aac65399806c528417329eb3dc1c87f0073e08bdb4cb

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • AgentTesla Payload

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Collection

Data from Local System

3
T1005

Tasks