General
-
Target
239bbdddbf48ec1e375741bb0ab39dd8b251eb2ce2cf578dbf128ad3129b748f.rar
-
Size
731KB
-
Sample
240523-bkkpfaga4w
-
MD5
0fcce245992997c97ac628c94a99d716
-
SHA1
5d409a6952555358313611ac8a1cc123a414545b
-
SHA256
239bbdddbf48ec1e375741bb0ab39dd8b251eb2ce2cf578dbf128ad3129b748f
-
SHA512
1eee893122c60a0cfd80a2298c038bd1603cf112610090c84a812e2687b0949f0875c7dbabd6f3bbe314f6eceff8714ca69c31e2816b29d240c138389ddd73be
-
SSDEEP
12288:MwFhxDfss9a/PkyJezbZkPqW5HxZEiCfhq7pGap17TS4WXjOAtoqNin1YTO:Mwzxor/8yoezZGfMtGap1PS4tAtoUiqa
Static task
static1
Behavioral task
behavioral1
Sample
Wire Transfer Payment Copy #18-05-2024.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.rushdi.ae - Port:
587 - Username:
[email protected] - Password:
Ah@5432969 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.rushdi.ae - Port:
587 - Username:
[email protected] - Password:
Ah@5432969
Targets
-
-
Target
Wire Transfer Payment Copy #18-05-2024.exe
-
Size
896KB
-
MD5
f350551099a8fc532cb883bdc55e31bd
-
SHA1
c757fbb281a8b883974740f6343244c54aa21c14
-
SHA256
7a76e6536ba34a728e8b04a6cb20fae3b252edc0de2e7ffa1e95508194ccecb3
-
SHA512
5dc9c5d1eb72e7060004b5415ce256a007d31c54fea1bc6d252e7680b14720e34cf53a7cabd0b49bef853f38a5e32e8f8fb5e7e38002b17a5d9bb98a94eb284e
-
SSDEEP
24576:BRVAfJWtb3BE1lMAzY0O14gZlcT6+C1MGQvn:TDZBEEAE0a4OlKmM5vn
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect packed .NET executables. Mostly AgentTeslaV4.
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion
-
Detects executables referencing Windows vault credential objects. Observed in infostealers
-
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
-
Detects executables referencing many email and collaboration clients. Observed in information stealers
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-