General

  • Target

    SHIPPING.EXE.exe

  • Size

    629KB

  • Sample

    231212-ng5lnacagl

  • MD5

    3de3b2aec3580c30d26038ae32e441d2

  • SHA1

    dfc2501866a225f36d61fe0fcbce7ed288a442cb

  • SHA256

    b4603870f2a94658bd915f7255062c0629fd8b756e96ad465871f9173a7a0379

  • SHA512

    56840bab4753d3c1ed380ee1092b3211fb2aeb723b964dbe2b046cd32b539a3d25b8becf39a117583d62415d6d57f55295a7f74d525aee0f553f535338ae22e1

  • SSDEEP

    12288:w3IU8S6eUdUO2sMCqXHwJORW4iWEgH8CRRjZQ1TGvqbbZuGMkRiPPVFeh:OItSAdUOwMOk/WvjZQ1tZuGMEiPPVF

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.mailo.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Bignosa1995

Targets

    • Target

      SHIPPING.EXE.exe

    • Size

      629KB

    • MD5

      3de3b2aec3580c30d26038ae32e441d2

    • SHA1

      dfc2501866a225f36d61fe0fcbce7ed288a442cb

    • SHA256

      b4603870f2a94658bd915f7255062c0629fd8b756e96ad465871f9173a7a0379

    • SHA512

      56840bab4753d3c1ed380ee1092b3211fb2aeb723b964dbe2b046cd32b539a3d25b8becf39a117583d62415d6d57f55295a7f74d525aee0f553f535338ae22e1

    • SSDEEP

      12288:w3IU8S6eUdUO2sMCqXHwJORW4iWEgH8CRRjZQ1TGvqbbZuGMkRiPPVFeh:OItSAdUOwMOk/WvjZQ1tZuGMEiPPVF

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks