General

  • Target

    3eca8ef9694a2869cfd991134e23b42294f671c0b4690ec851fa1a1ea8d5e117

  • Size

    1.2MB

  • Sample

    231207-czxszsghcn

  • MD5

    2b3afc0b1c84c9cc4ad695b16df0385e

  • SHA1

    a37738b0cbb97f1ffcc32bb19a4c67e788767023

  • SHA256

    3eca8ef9694a2869cfd991134e23b42294f671c0b4690ec851fa1a1ea8d5e117

  • SHA512

    a154a49c890b362fef97276e3a4e422985e2d95134423f04e9929badd538b680c673d18bc6907eb721e1039042eb3675008cf10e4bcd34f62a892b5c8c4ffb96

  • SSDEEP

    12288:Nu0KGq6Kc8S8tpWchUpSnB7itr4H444t:NuEjE7D9nB7i94H444t

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.atelierzolotas.gr
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    alibaba.com

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.atelierzolotas.gr
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    alibaba.com

Targets

    • Target

      Our Order & RFQ 6632311.exe

    • Size

      435KB

    • MD5

      b881374bc4264f837660e1d82d81d19b

    • SHA1

      5068bf4bbb30a983cabe7ffe937ce099f11c1588

    • SHA256

      eae0fc3297708ca9a66fad777210caa9c58656ceffce6ff029d9c6208861832c

    • SHA512

      30b0e3f5f551d898c2ff2098f67a6190bc1958e9565c59e31e0f5af6528bff5b1492e583f8be9967494de9a5a547680081cfc062f978f6e2db3bb7b6c254e2b0

    • SSDEEP

      12288:xu0KGq6Kc8S8tpWchUpSnB7itr4H444t:xuEjE7D9nB7i94H444t

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks