LATAM Under Siege: Agent Tesla’s 18-Month Credential Theft Campaign Against Chilean Enterprises
An 18-month Agent Tesla campaign is targeting LATAM enterprises, particularly in Chile, using procurement-themed phishing lures. The attack chain employs a multi-stage loader protected by .NET Reactor 6.x, utilizing process hollowing into aspnet_compiler.exe to execute the credential-stealing payload entirely in memory. Stolen data is exfiltrated via cleartext FTP to compromised legitimate infrastructure.
Authors: Moises Cerqueira
Source:
ANY.RUN
- domainemail[.]elrif[.]comEmail relay infrastructure
- domainemail[.]v[.]todotramitesperu[.]com[.]elgartizocon[.]roEmail relay infrastructure
- domainftp[.]horeca-bucuresti[.]roCompromised legitimate domain used as FTP C2 drop zone
- emailamericas2[@]horeca-bucuresti[.]roOperator drop account for FTP exfiltration
- ip208[.]95[.]112[.]1ip-api.com IP used for victim fingerprinting
- ip89[.]39[.]83[.]184FTP C2 server used for data exfiltration
- md578ba57f4a164bedc26204296ea09bb8fDecrypted payload
- md5a7eeead9c868d9944ed1c1f113328f32RAR dropper
- sha1b50b3800b17ad7ad5c4483c0b6b24d1d151a9d10RAR dropper
- sha25643d09743a69c9afa7156bf4e2bf7423b3d5f5ad7d54c4c3fb8a698d526778057Decrypted Agent Tesla payload in memory
- sha2567929355856A2A85D48F95D230CD74FBB5AD554BED49E73B1800136C4BCCCD1A8.jse encoded dropper
- sha256948C8C69FE02EDA9231AEBFA5C626335307058AC74A5C3C40B346179A1BFC982Initial RAR dropper (Orden de compra_pdf.uu)
- sha25696AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7PowerShell stager template
- sha256cd83f5ceb2d014badfa991106a9d37a6aeab9043d60d796ad0f16d36cdfa5703PowerShell stager (all variants)
- urlhxxp://ip-api[.]com/line/?fields=hostingPre-exfiltration hosting check URL
Detection / HunterGoogle
What Happened
A long-running cyberattack campaign is targeting businesses in Latin America, especially Chile, by sending fake purchase orders and payroll documents. When an employee opens the attached file, a hidden program called Agent Tesla is installed on their computer to steal passwords from web browsers, email accounts, and other business tools. This stolen information can lead to financial fraud, unauthorized access to company systems, and data breaches. Organizations should train employees to spot suspicious financial documents and use advanced security tools to catch this hidden threat.
Key Takeaways
- An 18-month Agent Tesla campaign is actively targeting LATAM enterprises, specifically in Chile, using procurement and finance-themed lures.
- The attack utilizes a multi-stage loader protected by .NET Reactor 6.x and employs Process Hollowing to evade static detection.
- The final Agent Tesla payload executes entirely in memory (fileless) and harvests credentials from over 80 applications.
- Data exfiltration occurs via cleartext FTP to compromised legitimate infrastructure, specifically a Romanian hospitality server.
- The malware performs pre-exfiltration victim fingerprinting using ip-api.com to avoid sandboxes and hosting providers.
Affected Systems
- Windows
- Web Browsers (Chrome, Firefox, Edge, etc.)
- Email Clients (Outlook, Thunderbird, etc.)
- FTP Clients
- VPN Clients
Attack Chain
The attack begins with a spear-phishing email containing a RAR archive disguised as a PDF (e.g., Orden de compra_pdf.uu). Extracting the archive reveals a JScript Encoded (.jse) dropper that downloads a decoy PDF and drops randomized PowerShell stagers to the C:\Temp\ directory. The PowerShell stager executes with an execution policy bypass, injecting a .NET Reactor-protected loader (ALTERNATE.dll) into the legitimate aspnet_compiler.exe process via Process Hollowing. Finally, the Agent Tesla payload is decrypted and executed entirely in memory, harvesting credentials from over 80 applications and exfiltrating the data via cleartext FTP to a compromised server.
Detection Availability
- YARA Rules: Yes
- Sigma Rules: Yes
- Snort/Suricata Rules: Yes
- KQL Queries: No
- Splunk SPL Queries: No
- EQL Queries: No
- Other Detection Logic: No
- Platforms: Suricata, YARA, Sigma
The article provides Suricata rules for detecting FTP exfiltration and hosting provider checks, a YARA rule for identifying the ALTERNATE.dll loader, and a Sigma rule for detecting process hollowing into aspnet_compiler.exe.
Detection Engineering Assessment
EDR Visibility: Medium — EDRs may struggle with the in-memory execution and .NET Reactor obfuscation, but should catch the process hollowing into aspnet_compiler.exe and the execution of PowerShell with bypass flags. Network Visibility: High — The exfiltration occurs over cleartext FTP, making the authentication handshake, C2 hostname, and exfiltrated data highly visible to network monitoring tools. Detection Difficulty: Moderate — While the static payload is heavily obfuscated and fileless, the behavioral indicators (process hollowing, cleartext FTP, specific API checks) provide reliable detection opportunities.
Required Log Sources
- Process Creation (Event ID 4688 / Sysmon Event ID 1)
- Network Connections (Sysmon Event ID 3)
- PowerShell Operational Logs (Event ID 4104)
Hunting Hypotheses
| Hypothesis | Telemetry | ATT&CK Stage | FP Risk |
|---|---|---|---|
| Consider hunting for powershell.exe spawning aspnet_compiler.exe, which may indicate process hollowing. | Process Creation | Execution/Defense Evasion | Low |
| If you have network visibility, consider hunting for outbound FTP traffic (port 21) containing STOR commands with 'PW_' prefixes. | Network Traffic | Exfiltration | Low |
| Consider hunting for HTTP GET requests to ip-api.com/line/?fields=hosting originating from non-browser processes. | Network Traffic | Discovery | Medium |
Control Gaps
- Static Antivirus
- Email gateways relying solely on file extensions
Key Behavioral Indicators
- aspnet_compiler.exe making outbound network connections
- PowerShell executing scripts from C:\Temp\ with randomized 8-character names
- Cleartext FTP traffic containing HTML-formatted credential reports
False Positive Assessment
- Low
Recommendations
Immediate Mitigation
- Verify against your organization's incident response runbook and team escalation paths before acting.
- Consider blocking outbound connections to the identified FTP C2 IP (89.39.83.184) and domain (ftp.horeca-bucuresti.ro).
- Evaluate whether to quarantine emails containing attachments with .uu, .jse, or .vbe extensions, especially within archives.
Infrastructure Hardening
- If applicable, consider restricting outbound FTP (port 21) traffic from user endpoints to the internet.
- Evaluate implementing strict execution policies for PowerShell and monitoring for bypass attempts.
User Protection
- Consider deploying EDR solutions capable of detecting process hollowing and in-memory execution.
- If supported by your tooling, evaluate blocking macro-enabled Office files from external senders.
Security Awareness
- Consider training finance and procurement teams to identify suspicious purchase order and payroll lures.
- Evaluate incorporating the verification of sender identities for financial documents into existing awareness programs.
MITRE ATT&CK Mapping
- T1566.001 - Phishing: Spearphishing Attachment
- T1027 - Obfuscated Files or Information
- T1059.007 - Command and Scripting Interpreter: JavaScript
- T1059.001 - Command and Scripting Interpreter: PowerShell
- T1055.012 - Process Injection: Process Hollowing
- T1027.002 - Obfuscated Files or Information: Software Packing
- T1555.003 - Credentials from Password Stores: Credentials from Web Browsers
- T1048.003 - Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol
- T1082 - System Information Discovery
- T1016 - System Network Configuration Discovery
Additional IOCs
- Ips:
208[.]95[.]112[.]1- ip-api.com IP used for victim fingerprinting
- Domains:
email[.]v[.]todotramitesperu[.]com[.]elgartizocon[.]ro- Email relay infrastructureemail[.]elrif[.]com- Email relay infrastructure
- Urls:
hxxp://ip-api[.]com/line/?fields=hosting- Pre-exfiltration hosting check URLfxp://ftp[.]horeca-bucuresti[.]ro- FTP C2 exfiltration endpoint
- File Hashes:
A7EEEAD9C868D9944ED1C1F113328F32(MD5) - RAR dropperB50B3800B17AD7AD5C4483C0B6B24D1D151A9D10(SHA1) - RAR dropperCD83F5CEB2D014BADFA991106A9D37A6AEAB9043D60D796AD0F16D36CDFA5703(SHA256) - PowerShell stager (all variants)78ba57f4a164bedc26204296ea09bb8f(MD5) - Decrypted payload
- Registry Keys:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run- Registry Run key used for persistence
- File Paths:
C:\Temp\[A-Z]{8}.ps1- Dropped stager pattern (regex)%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\- Startup folder persistence location7bcd610d-7af6-4dc2-875b-dc4fec91463c.exe- GUID filename used for autorun copyALTERNATE.dll- Internal loader identifier
- Command Lines:
- Purpose: Execute PowerShell stager with execution policy bypass | Tools:
powershell.exe| Stage: Execution |-ExecutionPolicy Bypass
- Purpose: Execute PowerShell stager with execution policy bypass | Tools:
- Other:
hdfzpysvpzimorhk- Secondary anti-re-infection mutexHnJnO- Campaign tag / build identifier