General

  • Target

    Para Transferi Bilgilendirmesi-dekont.exe

  • Size

    893KB

  • Sample

    231212-jnfhwsafb7

  • MD5

    21d1df1da2e98a9ab9268712b8448e84

  • SHA1

    37c3233503068ba139bddcd9569ebaa068265590

  • SHA256

    a6aecca7d8f0cf861ae32b0ce54822e1d3c82e94685861b130c842f602b9d7db

  • SHA512

    b6eda1358566719b0bd5923caad17d3f678b816eff8bc613a1930ec0f83fe8a4ea65194a15ebf2fb1458b8889b369483e19107eac955e0ea0c380ff3c456bd63

  • SSDEEP

    24576:K5xolYQY65XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXA:dYkXXXXXXXXXXXXXXXXXXXXXXXXXXXXQ

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.aksumer.com
  • Port:
    21
  • Username:
    aksumerc
  • Password:
    211116.kS*-

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.aksumer.com
  • Port:
    21
  • Username:
    aksumerc
  • Password:
    211116.kS*-

Targets

    • Target

      Para Transferi Bilgilendirmesi-dekont.exe

    • Size

      893KB

    • MD5

      21d1df1da2e98a9ab9268712b8448e84

    • SHA1

      37c3233503068ba139bddcd9569ebaa068265590

    • SHA256

      a6aecca7d8f0cf861ae32b0ce54822e1d3c82e94685861b130c842f602b9d7db

    • SHA512

      b6eda1358566719b0bd5923caad17d3f678b816eff8bc613a1930ec0f83fe8a4ea65194a15ebf2fb1458b8889b369483e19107eac955e0ea0c380ff3c456bd63

    • SSDEEP

      24576:K5xolYQY65XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXA:dYkXXXXXXXXXXXXXXXXXXXXXXXXXXXXQ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Modifies Installed Components in the registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks