General
-
Target
comprobante.xla
-
Size
557KB
-
Sample
240214-mm59psga8z
-
MD5
2110f2eca19cdd6bccf186799fb09f90
-
SHA1
77e2ab2c414b3fcb414fe953b7afe3b5d85dffa2
-
SHA256
f44324b10d18d0dab0d8ef44a4ae1248d47d5fbf22708b0a392e288c39912edf
-
SHA512
1122768ebff5596feb167f4d02664bc4821f0ac9e5ad61c2ff26001152750cc0199931cbcad51d53dfcfe1492a715b15a4c0db0c3403a2ea1fc825e4453675fb
-
SSDEEP
12288:pTk3SEXMcbNedomzEDc33bV6yMIQoLLOYC0Rvf80QHhB:6SSMMednEDc33bV4omYJ3Q
Static task
static1
Behavioral task
behavioral1
Sample
comprobante.xls
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
comprobante.xls
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.elquijotebanquetes.com - Port:
21 - Username:
[email protected] - Password:
-GN,s*KH{VEhPmo)+f
Targets
-
-
Target
comprobante.xla
-
Size
557KB
-
MD5
2110f2eca19cdd6bccf186799fb09f90
-
SHA1
77e2ab2c414b3fcb414fe953b7afe3b5d85dffa2
-
SHA256
f44324b10d18d0dab0d8ef44a4ae1248d47d5fbf22708b0a392e288c39912edf
-
SHA512
1122768ebff5596feb167f4d02664bc4821f0ac9e5ad61c2ff26001152750cc0199931cbcad51d53dfcfe1492a715b15a4c0db0c3403a2ea1fc825e4453675fb
-
SSDEEP
12288:pTk3SEXMcbNedomzEDc33bV6yMIQoLLOYC0Rvf80QHhB:6SSMMednEDc33bV4omYJ3Q
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Abuses OpenXML format to download file from external location
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-