General
-
Target
INDIGO CEFIRO - VESSEL PARTICULARS.pdf.lzh
-
Size
709KB
-
Sample
240521-e1fxzahb25
-
MD5
1399dda9fe485e166060571f477f6464
-
SHA1
e5e4aa39588aa3b67dc3522642a617f702f60e34
-
SHA256
7d06b86420d6d5b0a8e4e56496cfd86a6cc07a43bf79701b19c03f21d7dba0f5
-
SHA512
224535ebf218a02545f11ae68223cdccd6eef80049f114a5813bdf51b9d384d29f87bcad6eb803353f335a1ae725d4546af5eebb2a4d100630df853f6561037c
-
SSDEEP
12288:nfCHoNSbaKAYvR3PDZLv2qt2hEAB2Xkvu97Ymuj3PiMojYuy+etYNjU0f5pxqa4F:nfCHoQbaKtNBJ5Xkvu97/q3qMoMJ+eQQ
Static task
static1
Behavioral task
behavioral1
Sample
INDIGO CEFIRO - VESSEL PARTICULARS.pdf.scr
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
INDIGO CEFIRO - VESSEL PARTICULARS.pdf.scr
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://beirutrest.com - Port:
21 - Username:
[email protected] - Password:
9yXQ39wz(uL+
Extracted
Protocol: ftp- Host:
beirutrest.com - Port:
21 - Username:
[email protected] - Password:
9yXQ39wz(uL+
Targets
-
-
Target
INDIGO CEFIRO - VESSEL PARTICULARS.pdf.scr
-
Size
744KB
-
MD5
9e6e2cf548ecf7f6c13e476a0d759366
-
SHA1
36ba9376dccc7404ba515178e7a456e5f97f00be
-
SHA256
c047a048b7be9b9516d3df0cc45f3af5b5a2f7a6d21a5f874f822cb2008f8f4e
-
SHA512
d4bb9d43301d177d0879f29c55e6f4b298ff069859f0dd231a35071426bfc0d04482bfcfef01b22c67c591b918572963d3a506d9ee90d1eb8c97718c7b01cf0d
-
SSDEEP
12288:azCn6yWn7fcpVZlu/6uHEu5C0dFOmz9ugtsgHz6/v9APU+wKNixuFy/cm:Tn698VVYPOmz9btswgbxKgxuFy/3
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-