General
-
Target
swift copy.exe
-
Size
684KB
-
Sample
240510-kkchhadb4s
-
MD5
a92d8ccd3f38a76aa886072adf9c1c94
-
SHA1
f8c6907b69f6f828c3bf9a7a0f850c36e215f315
-
SHA256
37c5d5a6008968981d866924fd7af33224f8c44505b381aac2fecec0468cb241
-
SHA512
23460c4d395796c7773d754b64748b5112270a6a7fe28246a9eae8523a30cc05221f0f923a49ddd72aca2cf0c1156a3e9b5346846071049eb427cbb58e8ca460
-
SSDEEP
12288:sjuhnDveLAfN31k+iYghBUGCypYWGYvGRfGSuIiupVH2Qn:xnDv513W+iYghBUGdpxHvufxZkQn
Static task
static1
Behavioral task
behavioral1
Sample
swift copy.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.starmech.in - Port:
587 - Username:
[email protected] - Password:
gaging@2022
Extracted
agenttesla
Protocol: smtp- Host:
mail.starmech.in - Port:
587 - Username:
[email protected] - Password:
gaging@2022 - Email To:
[email protected]
Targets
-
-
Target
swift copy.exe
-
Size
684KB
-
MD5
a92d8ccd3f38a76aa886072adf9c1c94
-
SHA1
f8c6907b69f6f828c3bf9a7a0f850c36e215f315
-
SHA256
37c5d5a6008968981d866924fd7af33224f8c44505b381aac2fecec0468cb241
-
SHA512
23460c4d395796c7773d754b64748b5112270a6a7fe28246a9eae8523a30cc05221f0f923a49ddd72aca2cf0c1156a3e9b5346846071049eb427cbb58e8ca460
-
SSDEEP
12288:sjuhnDveLAfN31k+iYghBUGCypYWGYvGRfGSuIiupVH2Qn:xnDv513W+iYghBUGdpxHvufxZkQn
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Credential Access
Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1