General

  • Target

    e5ad7596e5fc883fa78c1644afe8337bc65c1ce3bded087a2cf923b99af40e76.xlsx

  • Size

    14KB

  • Sample

    240523-r1ljnsef79

  • MD5

    e889497aae5825f3ae149a28c30a143f

  • SHA1

    14df2a6bf9aab41ac3fbb4879dabea7f2722af1b

  • SHA256

    e5ad7596e5fc883fa78c1644afe8337bc65c1ce3bded087a2cf923b99af40e76

  • SHA512

    3e61ad9f68398d6c89dff4975344ac26eba2c248df6693d9dba694601ac27a29f8ebb24d9e0abff9eb1d237489a1aacfe964a09480a9a8f1b94b7072a8683423

  • SSDEEP

    384:+4BJXIZwOjvsjAp6RuBrrj/9MY9Vga6uavY3H:9B5IDx6Ryj/9VXga/3

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.midhcodistribuciones.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    ,A7}+JV4KExQ

Targets

    • Target

      e5ad7596e5fc883fa78c1644afe8337bc65c1ce3bded087a2cf923b99af40e76.xlsx

    • Size

      14KB

    • MD5

      e889497aae5825f3ae149a28c30a143f

    • SHA1

      14df2a6bf9aab41ac3fbb4879dabea7f2722af1b

    • SHA256

      e5ad7596e5fc883fa78c1644afe8337bc65c1ce3bded087a2cf923b99af40e76

    • SHA512

      3e61ad9f68398d6c89dff4975344ac26eba2c248df6693d9dba694601ac27a29f8ebb24d9e0abff9eb1d237489a1aacfe964a09480a9a8f1b94b7072a8683423

    • SSDEEP

      384:+4BJXIZwOjvsjAp6RuBrrj/9MY9Vga6uavY3H:9B5IDx6Ryj/9VXga/3

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks