General

  • Target

    TAQAH - VESSEL PARTICULARS.PDF.lzh

  • Size

    644KB

  • Sample

    240522-lct81saf7y

  • MD5

    06bd788c7515fc8c2711199e594dd02b

  • SHA1

    f3c7a36ddc30af634c5702503ba27b3068fb3db2

  • SHA256

    7f59d59eaec3e57137787d75d2ba8d5fe40e469b60acd61b398e770a22b15eb6

  • SHA512

    c1e3c685fc16dfcb68f88b18455fa5630a28d1ec05d127253d10f029c451191faaab953ff6a1c669fe55ae9a56c6134e9b732c6c1d5e4772fb46d77523ce5d85

  • SSDEEP

    12288:O9UpWiB9V7GnmxMMiaepOZ80vb8i78r48xHLKrlJU0DRWeyT+MgH:OitfKmxMMGpK3jN58t2rM0DGG

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://beirutrest.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    9yXQ39wz(uL+

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    beirutrest.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    9yXQ39wz(uL+

Targets

    • Target

      TAQAH - VESSEL PARTICULARS.PDF.scr

    • Size

      665KB

    • MD5

      b51160bbcf48437d66790f228769ce73

    • SHA1

      38865f0047aef6afdeff054baf3e6387ddd2b012

    • SHA256

      89bd0410a26507a9acbb4d5150b5f284e7a4263ddf65930234d9a3ebddb26da3

    • SHA512

      ed8714a3e4f918bf0cb62edfc19300714366e55393b3abbf60f8fd5b439146ceee26b062720238484efc0c240a2ceeadf981abe2f7406bf6b567f871f2acc1bd

    • SSDEEP

      12288:Q99RHgaa+nw+eybQ70OD0PdLGv4ZRo0WSJR+/2x8MARET204MK2eyBeg:QxAaa25eybVllLPZW52+MARJ04t

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks