General

  • Target

    ConfirmaciĆ³n transferencia interbancaria (Banco Santander)-password(iMjzusO8).zip

  • Size

    1.1MB

  • Sample

    250122-2f8htazmen

  • MD5

    cd39d75816af1d12b0d7d0b81e6c5372

  • SHA1

    2cc78924b48646814398ac85ecd4d3770e5d0dee

  • SHA256

    05995fbd6377f214e1c9c1f26e29f63f5073e45f579c65e1aae0dc93e055a3b7

  • SHA512

    bd95724b8f196bacd1bda6c54fdba1ed20dc7297f09468b7edbde9b7f905c0dd313938b77dce3ebafd77bf091077da4cbb5835210dc3302ace4df8adb1126612

  • SSDEEP

    24576:9ojrpwT3NceCtWzoTE+L1L6U4PoIzudSVVt/0YBX:4COLYzov1LT4wIqdSVz/FBX

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.controlfire.com.mx
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    0a4XlE=4t8mz

Targets

    • Target

      Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.7z

    • Size

      791KB

    • MD5

      eefe9cb1da2c5dc85184e4f47e5550bb

    • SHA1

      062563762fa1051449405812ae257dddb4c6694c

    • SHA256

      e446ae2fc3adac5f36700dc6c69efb421a569266cae84742e7027d6c980a0f6e

    • SHA512

      f085850f6402b957a7f048284131d7e4f3e696d5b6b4b4609bea1d93f61805af0451dc942fb24ee585b3e892c906284e13d5a95fc6097cb4253c2669f9bc3a44

    • SSDEEP

      12288:XpUqUQJx5t42kZqfYt6J5EquI6jDsjPeJA7hJDwN0Brp/Uga6ZRxzZ6ls6Gbpj:ZpUe5ePqfBjJj/hXZ9Uga6RxsGbpj

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Executes dropped EXE

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks