General
-
Target
Shipping documents 00029388485859000999
-
Size
657KB
-
Sample
240919-l5yf5ssgla
-
MD5
c75450c5884da58a0f34dbba790221c3
-
SHA1
4c673f65248762b2837c9ea144bad2c8ed97c37f
-
SHA256
8422b23b9711fde2ce8d836c845421ce6e5ded8178159aa46bbd3ca26fd7b16e
-
SHA512
8c3f16018767e93a5ff371e0e8e6c968b69dd475094cf5b615f79a9bb356c664366f21596045cf418c7ec101f20819d74a1c87535c9299fc437b6fc1e82e5f69
-
SSDEEP
12288:kLIeHyO4FEIGZDu0rOO0RlbFpAIhAFr/G0o/Ajvlgn3X0sWufx9uUoHPEqzz:TkNrnUtFpd0o/4vlQ3X0Z
Static task
static1
Behavioral task
behavioral1
Sample
Shipping documents 00029388485859000999.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Shipping documents 00029388485859000999.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.concaribe.com - Port:
21 - Username:
[email protected] - Password:
ro}UWgz#!38E
Extracted
Protocol: ftp- Host:
ftp.concaribe.com - Port:
21 - Username:
[email protected] - Password:
ro}UWgz#!38E
Targets
-
-
Target
Shipping documents 00029388485859000999
-
Size
657KB
-
MD5
c75450c5884da58a0f34dbba790221c3
-
SHA1
4c673f65248762b2837c9ea144bad2c8ed97c37f
-
SHA256
8422b23b9711fde2ce8d836c845421ce6e5ded8178159aa46bbd3ca26fd7b16e
-
SHA512
8c3f16018767e93a5ff371e0e8e6c968b69dd475094cf5b615f79a9bb356c664366f21596045cf418c7ec101f20819d74a1c87535c9299fc437b6fc1e82e5f69
-
SSDEEP
12288:kLIeHyO4FEIGZDu0rOO0RlbFpAIhAFr/G0o/Ajvlgn3X0sWufx9uUoHPEqzz:TkNrnUtFpd0o/4vlQ3X0Z
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1