General

  • Target

    INDIGO CEFIRO - VESSEL PARTICULARS.pdf.lzh

  • Size

    709KB

  • Sample

    240521-e1fxzahb25

  • MD5

    1399dda9fe485e166060571f477f6464

  • SHA1

    e5e4aa39588aa3b67dc3522642a617f702f60e34

  • SHA256

    7d06b86420d6d5b0a8e4e56496cfd86a6cc07a43bf79701b19c03f21d7dba0f5

  • SHA512

    224535ebf218a02545f11ae68223cdccd6eef80049f114a5813bdf51b9d384d29f87bcad6eb803353f335a1ae725d4546af5eebb2a4d100630df853f6561037c

  • SSDEEP

    12288:nfCHoNSbaKAYvR3PDZLv2qt2hEAB2Xkvu97Ymuj3PiMojYuy+etYNjU0f5pxqa4F:nfCHoQbaKtNBJ5Xkvu97/q3qMoMJ+eQQ

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://beirutrest.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    9yXQ39wz(uL+

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    beirutrest.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    9yXQ39wz(uL+

Targets

    • Target

      INDIGO CEFIRO - VESSEL PARTICULARS.pdf.scr

    • Size

      744KB

    • MD5

      9e6e2cf548ecf7f6c13e476a0d759366

    • SHA1

      36ba9376dccc7404ba515178e7a456e5f97f00be

    • SHA256

      c047a048b7be9b9516d3df0cc45f3af5b5a2f7a6d21a5f874f822cb2008f8f4e

    • SHA512

      d4bb9d43301d177d0879f29c55e6f4b298ff069859f0dd231a35071426bfc0d04482bfcfef01b22c67c591b918572963d3a506d9ee90d1eb8c97718c7b01cf0d

    • SSDEEP

      12288:azCn6yWn7fcpVZlu/6uHEu5C0dFOmz9ugtsgHz6/v9APU+wKNixuFy/cm:Tn698VVYPOmz9btswgbxKgxuFy/3

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks