General

  • Target

    Bestellung+BEE-22201200_pdf+++++++++++++++++++++++++++++++++++++++++++++++.img

  • Size

    104KB

  • Sample

    240212-yqzf4sbd4y

  • MD5

    cdfb2162885d92ca5fd2c8c1a3c79705

  • SHA1

    fefdeecc76163884124c070bf0f0fea9c027354f

  • SHA256

    95f3bf41ab43a29221a702337ffd53a3974b628aa6c5eccd37a4cf3d79732740

  • SHA512

    b7a48d32285305024414561bef69011e0a287b8f11c7b0fd12a469fe9cfd63abef424f922a360a0e66604669740a224c71011e94bd2ced0de000280ebd06d6be

  • SSDEEP

    96:5ReBVCIzP+eImTgo70FlDiC5ZUo4ossr9r4GvgsKC5Ys0X+zNt:gVCcPjTgJhYo4orprW7o0XY

Malware Config

Extracted

Family

purecrypter

C2

http://103.183.118.30/THANOS/Uhjbks.mp4

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Bestellung+BEE-22201200_pdf+++++++++++++++++++++++++++++++++++++++++++++++.img

    • Size

      104KB

    • MD5

      cdfb2162885d92ca5fd2c8c1a3c79705

    • SHA1

      fefdeecc76163884124c070bf0f0fea9c027354f

    • SHA256

      95f3bf41ab43a29221a702337ffd53a3974b628aa6c5eccd37a4cf3d79732740

    • SHA512

      b7a48d32285305024414561bef69011e0a287b8f11c7b0fd12a469fe9cfd63abef424f922a360a0e66604669740a224c71011e94bd2ced0de000280ebd06d6be

    • SSDEEP

      96:5ReBVCIzP+eImTgo70FlDiC5ZUo4ossr9r4GvgsKC5Ys0X+zNt:gVCcPjTgJhYo4orprW7o0XY

    Score
    3/10
    • Target

      out.iso

    • Size

      104KB

    • MD5

      cdfb2162885d92ca5fd2c8c1a3c79705

    • SHA1

      fefdeecc76163884124c070bf0f0fea9c027354f

    • SHA256

      95f3bf41ab43a29221a702337ffd53a3974b628aa6c5eccd37a4cf3d79732740

    • SHA512

      b7a48d32285305024414561bef69011e0a287b8f11c7b0fd12a469fe9cfd63abef424f922a360a0e66604669740a224c71011e94bd2ced0de000280ebd06d6be

    • SSDEEP

      96:5ReBVCIzP+eImTgo70FlDiC5ZUo4ossr9r4GvgsKC5Ys0X+zNt:gVCcPjTgJhYo4orprW7o0XY

    Score
    1/10
    • Target

      Bestellung BEE-22201200_pdf .exe

    • Size

      42KB

    • MD5

      f383d42f52d226f1280dae8f3c761e6d

    • SHA1

      4f7f76201dd474b8839da97821c8704afdab2ffe

    • SHA256

      f01893f0ea80536648b45114aa491a4559b53696290f58ec66335bc5c116d9db

    • SHA512

      eb4d74f1a0c21fdae1a8eddbc7a9cb42aa04d5f27e19f9b12e11c303ba52292100f57e3a9b8b0bc1b05588eb584d8ad3c73fc5e717d36169adde516c90380c18

    • SSDEEP

      96:QTgo70FlDiC5ZUo4ossr9r4GvgsKC5Ys0X+zNt:QTgJhYo4orprW7o0XY

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • PureCrypter

      PureCrypter is a .NET malware loader first seen in early 2021.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

3
T1552

Credentials In Files

3
T1552.001

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks