General

  • Target

    05122024_1401_1f5c2366ec3def7b678b944431e78fdc1b8849a3736179a52061ffb9725a3c76

  • Size

    1.7MB

  • Sample

    241205-rbygyaxncv

  • MD5

    dba8a311691450b0e8b6596b36a88b1f

  • SHA1

    bcc51154d3def4dc361919b417f9071e1ad80624

  • SHA256

    1f5c2366ec3def7b678b944431e78fdc1b8849a3736179a52061ffb9725a3c76

  • SHA512

    3d47d5d5aa57482c041ebf83cc874b3e8a09bf523ddeb1a3711417e6dd26b16569c2a6fd2205a4e3bbcaea497ddef8e58febdf4c0d1ebe8dd024c8da19d749de

  • SSDEEP

    24576:5M05N3bjp8JvtuHsTWOnfdEtUKTTzXulT:5MAuJvtTWOfWtzTTz+p

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.concaribe.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    ro}UWgz#!38E

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.concaribe.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    ro}UWgz#!38E

Targets

    • Target

      PO.bat

    • Size

      1.1MB

    • MD5

      b9e43fb03b26fe314c298bc7e94f4d8c

    • SHA1

      21e6ea3c8016b77a5e4e38b389c98168216ba882

    • SHA256

      23e2a118c0a74c6a6e1c8a0750dfbe6109118443de35021389b683a14393fae4

    • SHA512

      675a404ade77ddd2f8173f81812a985669c6f6755ff287867eed942918cd16edef4d2bcc72638adbcce5940f449c220761bdbbde5a0f64dad9d67191027cc166

    • SSDEEP

      24576:HM05N3bjp8JvtuHsTWOnfdEtUKTTzXulTr:HMAuJvtTWOfWtzTTz+pr

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      fc90dfb694d0e17b013d6f818bce41b0

    • SHA1

      3243969886d640af3bfa442728b9f0dff9d5f5b0

    • SHA256

      7fe77ca13121a113c59630a3dba0c8aaa6372e8082393274da8f8608c4ce4528

    • SHA512

      324f13aa7a33c6408e2a57c3484d1691ecee7c3c1366de2bb8978c8dc66b18425d8cab5a32d1702c13c43703e36148a022263de7166afdce141da2b01169f1c6

    • SSDEEP

      192:e/b2HS5ih/7i00eWz9T7PH6yeFcQMI5+Vw+EXWZ77dslFZk:ewSUmWw9T7MmnI5+/F7Kdk

    Score
    3/10
    • Target

      Slubberten/hypohydrochloria.app

    • Size

      487KB

    • MD5

      271b95b44bbafaf5d68ae0d972e1163a

    • SHA1

      6816bd06b9b638de8e6517dfe7647ce409f2f4c8

    • SHA256

      60412767f4eaea33f06a6a02f3b0975015e75f251ba6cbeee96ac712d0b23f9b

    • SHA512

      cb7a65001cc0dbb63cddcd89166b575bd2612f75100ca47ff8a8162825a5c91a5c2b60b83447f33a7aad1c0f1a7eee4c5f340e5d66141ee59309b59ca461d992

    • SSDEEP

      1536:vGAVO3tWkduBR8240f+rzESOotNlufM+A/:nYQSA6AMIk+A/

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks