General

  • Target

    Shipping documents 00029388485859000999

  • Size

    657KB

  • Sample

    240919-l5yf5ssgla

  • MD5

    c75450c5884da58a0f34dbba790221c3

  • SHA1

    4c673f65248762b2837c9ea144bad2c8ed97c37f

  • SHA256

    8422b23b9711fde2ce8d836c845421ce6e5ded8178159aa46bbd3ca26fd7b16e

  • SHA512

    8c3f16018767e93a5ff371e0e8e6c968b69dd475094cf5b615f79a9bb356c664366f21596045cf418c7ec101f20819d74a1c87535c9299fc437b6fc1e82e5f69

  • SSDEEP

    12288:kLIeHyO4FEIGZDu0rOO0RlbFpAIhAFr/G0o/Ajvlgn3X0sWufx9uUoHPEqzz:TkNrnUtFpd0o/4vlQ3X0Z

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.concaribe.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    ro}UWgz#!38E

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.concaribe.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    ro}UWgz#!38E

Targets

    • Target

      Shipping documents 00029388485859000999

    • Size

      657KB

    • MD5

      c75450c5884da58a0f34dbba790221c3

    • SHA1

      4c673f65248762b2837c9ea144bad2c8ed97c37f

    • SHA256

      8422b23b9711fde2ce8d836c845421ce6e5ded8178159aa46bbd3ca26fd7b16e

    • SHA512

      8c3f16018767e93a5ff371e0e8e6c968b69dd475094cf5b615f79a9bb356c664366f21596045cf418c7ec101f20819d74a1c87535c9299fc437b6fc1e82e5f69

    • SSDEEP

      12288:kLIeHyO4FEIGZDu0rOO0RlbFpAIhAFr/G0o/Ajvlgn3X0sWufx9uUoHPEqzz:TkNrnUtFpd0o/4vlQ3X0Z

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks