General

  • Target

    comprobante.xla

  • Size

    557KB

  • Sample

    240214-mm59psga8z

  • MD5

    2110f2eca19cdd6bccf186799fb09f90

  • SHA1

    77e2ab2c414b3fcb414fe953b7afe3b5d85dffa2

  • SHA256

    f44324b10d18d0dab0d8ef44a4ae1248d47d5fbf22708b0a392e288c39912edf

  • SHA512

    1122768ebff5596feb167f4d02664bc4821f0ac9e5ad61c2ff26001152750cc0199931cbcad51d53dfcfe1492a715b15a4c0db0c3403a2ea1fc825e4453675fb

  • SSDEEP

    12288:pTk3SEXMcbNedomzEDc33bV6yMIQoLLOYC0Rvf80QHhB:6SSMMednEDc33bV4omYJ3Q

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    -GN,s*KH{VEhPmo)+f

Targets

    • Target

      comprobante.xla

    • Size

      557KB

    • MD5

      2110f2eca19cdd6bccf186799fb09f90

    • SHA1

      77e2ab2c414b3fcb414fe953b7afe3b5d85dffa2

    • SHA256

      f44324b10d18d0dab0d8ef44a4ae1248d47d5fbf22708b0a392e288c39912edf

    • SHA512

      1122768ebff5596feb167f4d02664bc4821f0ac9e5ad61c2ff26001152750cc0199931cbcad51d53dfcfe1492a715b15a4c0db0c3403a2ea1fc825e4453675fb

    • SSDEEP

      12288:pTk3SEXMcbNedomzEDc33bV6yMIQoLLOYC0Rvf80QHhB:6SSMMednEDc33bV4omYJ3Q

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Abuses OpenXML format to download file from external location

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks