General

  • Target

    PRESUPUESTO_JUSTIFICANTE-BBVA.exe

  • Size

    710KB

  • Sample

    231010-kgrg9aec58

  • MD5

    29d0fdd543e4e171686378f7ff63c76d

  • SHA1

    0bc689b8686620d59aba2d7221e45c337ef855d4

  • SHA256

    d2355e84bd9dff1872c5bf04051c3984de36958b0af97c1ad874bce663501399

  • SHA512

    77fe057a5b3c9a296accab05bc2c8fafedfbccdcf6865e0c907bfbba54b8ad45427341f26cfed9879094d2c6318cb9e817f243cd7c3b24428b9c17b64b6a7bf8

  • SSDEEP

    12288:2hX9KJSxHLvf6GqJiFaR9giW1+WhVVsg8KI6hKV1CEFm/LUKvum0YgvMB:2htCS9Lvf6GOJ1WIW9sg8GhKlO310tG

Malware Config

Extracted

Family

agenttesla

C2

https://discordapp.com/api/webhooks/1150611970358255616/TcoC3JrTki0Xd-EXOGznvPK0OsuJm9IeeUEQvrN7JXow_2oGDOWPWLU8gGbdLwevrDns

Targets

    • Target

      PRESUPUESTO_JUSTIFICANTE-BBVA.exe

    • Size

      710KB

    • MD5

      29d0fdd543e4e171686378f7ff63c76d

    • SHA1

      0bc689b8686620d59aba2d7221e45c337ef855d4

    • SHA256

      d2355e84bd9dff1872c5bf04051c3984de36958b0af97c1ad874bce663501399

    • SHA512

      77fe057a5b3c9a296accab05bc2c8fafedfbccdcf6865e0c907bfbba54b8ad45427341f26cfed9879094d2c6318cb9e817f243cd7c3b24428b9c17b64b6a7bf8

    • SSDEEP

      12288:2hX9KJSxHLvf6GqJiFaR9giW1+WhVVsg8KI6hKV1CEFm/LUKvum0YgvMB:2htCS9Lvf6GOJ1WIW9sg8GhKlO310tG

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks