Overview
overview
10Static
static
100477d366c3...34.exe
windows7-x64
100477d366c3...34.exe
windows10-2004-x64
100cdc65a0b7...ae.exe
windows7-x64
100cdc65a0b7...ae.exe
windows10-2004-x64
100f59ce5495...42.exe
windows7-x64
100f59ce5495...42.exe
windows10-2004-x64
1016a7955213...f9.elf
debian-12-mipsel
1d6d36ec58...e2.vbs
windows7-x64
81d6d36ec58...e2.vbs
windows10-2004-x64
836a837a789...ed.elf
debian-12-mipsel
4c677969cd...44.exe
windows7-x64
104c677969cd...44.exe
windows10-2004-x64
1057430074be...49.exe
windows7-x64
1057430074be...49.exe
windows10-2004-x64
1068a9e97be5...99.exe
windows7-x64
768a9e97be5...99.exe
windows10-2004-x64
107a976ca005...ae.exe
windows7-x64
107a976ca005...ae.exe
windows10-2004-x64
10SKGHM_PE_7...ad.vbs
windows7-x64
8SKGHM_PE_7...ad.vbs
windows10-2004-x64
8CV Elena A...ia.exe
windows7-x64
10CV Elena A...ia.exe
windows10-2004-x64
10TEKLİF TA...xs.exe
windows7-x64
10TEKLİF TA...xs.exe
windows10-2004-x64
10fa396ba6c1...6c.exe
windows7-x64
10fa396ba6c1...6c.exe
windows10-2004-x64
1General
-
Target
c4990aebded04b1f4a9c34072e736771183d8dcd091adf27ede3cb8c04ba520c
-
Size
5.7MB
-
Sample
240620-cwmhvaxhqq
-
MD5
15317a0db98ac9c90ec9b3b9dd22dc3f
-
SHA1
6162baa5bed419865a92779617522814451b7306
-
SHA256
c4990aebded04b1f4a9c34072e736771183d8dcd091adf27ede3cb8c04ba520c
-
SHA512
0adee4da5a7c73d18b4dddf403c53447e38260e651714c5a3cd2cb9cb6ca6111e050a7bf6d8885ecae384c01ed332ee946f99c020b216039d972c6ea7cff9949
-
SSDEEP
98304:F2tnm4+igyfxCuqTr0XQZrirlfIls1M/AXJAp9nsYInfyDC4/P6adbFWl/U:8U4VbJw/gorirlIXkJ898fJ+6ads+
Behavioral task
behavioral1
Sample
0477d366c3dce1723cf124fc263a85654b4454909dffcc0d325020f1187e4f34.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0477d366c3dce1723cf124fc263a85654b4454909dffcc0d325020f1187e4f34.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
0cdc65a0b7fa4c5628fa770639f41f2ccc8660bc1df91817f7d8afe59f2ef2ae.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
0cdc65a0b7fa4c5628fa770639f41f2ccc8660bc1df91817f7d8afe59f2ef2ae.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
0f59ce549544ddeaf45168bce4908445413c92c48b7baaefd317e36658796642.exe
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
0f59ce549544ddeaf45168bce4908445413c92c48b7baaefd317e36658796642.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
16a7955213e4a78c58b8babe250d09e36e5567e18c7396bb7326af907e604ef9.elf
Resource
debian12-mipsel-20240221-en
Behavioral task
behavioral8
Sample
1d6d36ec589cbecea839e3b4a5156a35f48436847043f2e1f307f6579e7893e2.vbs
Resource
win7-20231129-en
Behavioral task
behavioral9
Sample
1d6d36ec589cbecea839e3b4a5156a35f48436847043f2e1f307f6579e7893e2.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
36a837a789f23110df93012b7da12c54857e10f342467d9ba2c0d0e2b2471fed.elf
Resource
debian12-mipsel-20240418-en
Behavioral task
behavioral11
Sample
4c677969cde4b12fede4247e99653415ccf938d98d4958d99af13193cefab844.exe
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
4c677969cde4b12fede4247e99653415ccf938d98d4958d99af13193cefab844.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
57430074bee1e7a668e0ece81119fcc8595a70c8a0e6be3d98bf1cc455f4fd49.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
57430074bee1e7a668e0ece81119fcc8595a70c8a0e6be3d98bf1cc455f4fd49.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
68a9e97be5bec9fba6108897ebef0a1f00dec90cf894071dc80ba0fed62a2999.exe
Resource
win7-20240611-en
Behavioral task
behavioral16
Sample
68a9e97be5bec9fba6108897ebef0a1f00dec90cf894071dc80ba0fed62a2999.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
7a976ca005082ab7acea1a46330935bfdfeedf70f37f1707122b7335fa7201ae.exe
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
7a976ca005082ab7acea1a46330935bfdfeedf70f37f1707122b7335fa7201ae.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
SKGHM_PE_757583588358839538539599593BeoersKnucklehead.vbs
Resource
win7-20240220-en
Behavioral task
behavioral20
Sample
SKGHM_PE_757583588358839538539599593BeoersKnucklehead.vbs
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
CV Elena Alba Garcia.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
CV Elena Alba Garcia.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
TEKLİF TALEP VE FİYAT TEKLİFİ_xlxs.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
TEKLİF TALEP VE FİYAT TEKLİFİ_xlxs.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
fa396ba6c1ae4e9c786cff1a78012d86bd9a896f4999d4ba3b90864021fa806c.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
fa396ba6c1ae4e9c786cff1a78012d86bd9a896f4999d4ba3b90864021fa806c.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp8nl.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
@qwerty90123 - Email To:
[email protected]
https://api.telegram.org/bot6398508790:AAFROO4FvHYek5_hchyogAsV7yTvxfINRRg/
Extracted
mirai
BOTNET
Extracted
Protocol: smtp- Host:
mail.ppg-pa.com - Port:
587 - Username:
[email protected] - Password:
DKKfy2001$
Extracted
risepro
77.91.77.122:50500
Extracted
Protocol: smtp- Host:
mail.softtricksmedia.com - Port:
587 - Username:
[email protected] - Password:
soft#!7som7
Targets
-
-
Target
0477d366c3dce1723cf124fc263a85654b4454909dffcc0d325020f1187e4f34.exe
-
Size
602KB
-
MD5
b4b045a39da0b2d38940085d78d1ab14
-
SHA1
2678aa772b284a12488e7abdb5c9bab76a0bd9bf
-
SHA256
0477d366c3dce1723cf124fc263a85654b4454909dffcc0d325020f1187e4f34
-
SHA512
e2a13b0b7bfaf3c3a02672425de6a32d87e0a0cdb7c6439ba91bac53429d420ce602ac3654216add8ccf416ba58688388667233c2144941c07cfc318e8c35184
-
SSDEEP
12288:78ALbFN7nwPgrUd+N2qUouxL/8YpOrbW1wEW9XGGc5S0xquGjk+kJhDd:LLwIrw+oq9uxT8sOrbW1wEQXOS0RXd
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-
-
-
Target
0cdc65a0b7fa4c5628fa770639f41f2ccc8660bc1df91817f7d8afe59f2ef2ae.exe
-
Size
262KB
-
MD5
703d59b74a008335c79d8845f9529aee
-
SHA1
d5a2da3813a5e377b271e92a6b32caff36833e24
-
SHA256
0cdc65a0b7fa4c5628fa770639f41f2ccc8660bc1df91817f7d8afe59f2ef2ae
-
SHA512
77cb4b819d5177ee16fb5511280c5edcfb24817cea536df3a15bf078cbb25b3761e9816c6a4dafe2a6c0c40c6f933e93fa2919adc00399ddf6be66f133b3dde3
-
SSDEEP
6144:6DKW1Lgbdl0TBBvjc/2tfjgGODiQPHwT3WxHDwuO:8h1Lk70TnvjcuFEGODPvwiGuO
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
0f59ce549544ddeaf45168bce4908445413c92c48b7baaefd317e36658796642.exe
-
Size
237KB
-
MD5
7847646a82f2e8118c085c790b12f095
-
SHA1
091b4d9b8cc72b6cb6e91b6f264ca5ffc619539f
-
SHA256
0f59ce549544ddeaf45168bce4908445413c92c48b7baaefd317e36658796642
-
SHA512
d2466ab1149a5fce64fe09127d271132f1b64fb7eb460946878307e421324129174a8f8b16c9d002cffbc63aa8aca55f37aa4cf5e9363c4f1108d500df94fb67
-
SSDEEP
3072:DglEeWumuQ3UQSjH5J13lFbJgrG/jbo5ihpW0tfE:DgeeWumuQ3JSjH5nhBbZDW0f
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
-
-
Target
16a7955213e4a78c58b8babe250d09e36e5567e18c7396bb7326af907e604ef9.elf
-
Size
138KB
-
MD5
98e31889837861036d55f5ccc81267d1
-
SHA1
56903c1ff5088f858187078dc260320b8692bc5c
-
SHA256
16a7955213e4a78c58b8babe250d09e36e5567e18c7396bb7326af907e604ef9
-
SHA512
8776ffad660b5a931e26bae9db9b813526c284cf64cbac432c41879f89381e60734a059bb04639118c593ebfd892621d978f46e6380b738ef3207bcdd953c05f
-
SSDEEP
3072:eoDf4yfSJMZXf9tB3VggBc8VYmZ8ezF2wcmSi3tH+y:h7fFtjlxRz/cm33V+y
Score1/10 -
-
-
Target
1d6d36ec589cbecea839e3b4a5156a35f48436847043f2e1f307f6579e7893e2.vbs
-
Size
154KB
-
MD5
8993abe6fdbed5a58e5f8806cb1a12d8
-
SHA1
6f52e232be6a55b0411d2d2bf1e03b01b7388921
-
SHA256
1d6d36ec589cbecea839e3b4a5156a35f48436847043f2e1f307f6579e7893e2
-
SHA512
9de0b6554063778d0fec454f0fcb72acc5a1b652aff0f4513254097b6cfdce80c496e330ba93c2bacbabc5437fa508a124eb5e099c0e92dca2d7b70975090bd3
-
SSDEEP
3072:Gvn9Dm5IXdH7eAlsSyP/ioJbae+nzu6J5RcuXrMLyVZH4lY0Gx2gDwDjNMrt:Gvn9Dm5IXdH7ecsSyP/io9ae+nzu6J5j
Score8/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
-
-
Target
36a837a789f23110df93012b7da12c54857e10f342467d9ba2c0d0e2b2471fed.elf
-
Size
70KB
-
MD5
7762aace160a4a060b9fb26babaefc14
-
SHA1
e5b5303fe5a3e977facc1e2b8db639883b01dda1
-
SHA256
36a837a789f23110df93012b7da12c54857e10f342467d9ba2c0d0e2b2471fed
-
SHA512
e39a7efd942831807948913938471e01bc12ffa3475801845746243c626deb482a8f4b1ac09d1a0839e200d140017304082e1ce47b882b9fcd7f96093a3532a2
-
SSDEEP
1536:5NcpHox7nXG4GTwplIaCDyV6jd7AI3kF/nznEjLr2WVNIsgKOf8d:5N407Xj3PIaCDMo+I3gnzEjLrJlOf8d
Score1/10 -
-
-
Target
4c677969cde4b12fede4247e99653415ccf938d98d4958d99af13193cefab844.exe
-
Size
635KB
-
MD5
af4c4394fd76d48c76265fa7393dbaf1
-
SHA1
d08fe29a6362e1416ea464766beb2e5120a8d347
-
SHA256
4c677969cde4b12fede4247e99653415ccf938d98d4958d99af13193cefab844
-
SHA512
fa0a58d48584e3547c643c5df0f2783ba73d584306630feb4a9abd32f583df48d25339ed964393e12c52717a33168c9e65ea6b58c6e6525d9ed216952a895738
-
SSDEEP
12288:Ia9PJCwxBS/ktL8picnoYgwkSpX3MBdkFIyFLkEseB7U5UjJJ++BzqyJM:ICPJCwi/+L84tSpHMBqGydkEseB4eJ+I
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
57430074bee1e7a668e0ece81119fcc8595a70c8a0e6be3d98bf1cc455f4fd49.exe
-
Size
265KB
-
MD5
0da587694f34431b18b09ec33c15d065
-
SHA1
0e46586eda6c403c54674963522c7f9ce0a5fe73
-
SHA256
57430074bee1e7a668e0ece81119fcc8595a70c8a0e6be3d98bf1cc455f4fd49
-
SHA512
9e1c62d6d268efd2473dac0af0405617b24239efcc9a3d7640935fcb6549de7e1f3664276ed7a28465a3be61d5fe6934de06f3938707ef3403a10a26cf74b136
-
SSDEEP
6144:5DKW1Lgbdl0TBBvjc/fNVOAboGApTQMeoBq7ST6:ph1Lk70TnvjcXNsbGAppeoq+u
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
68a9e97be5bec9fba6108897ebef0a1f00dec90cf894071dc80ba0fed62a2999.exe
-
Size
2.6MB
-
MD5
c8432b773d48e5e0a9f2d1ecb7c557f8
-
SHA1
ffd30a12849776a23351e9e768fc7b635553c271
-
SHA256
68a9e97be5bec9fba6108897ebef0a1f00dec90cf894071dc80ba0fed62a2999
-
SHA512
7d2e4e382f9591f0ba5098d6a265f6b70b5a6c360f6223ac0309edf7bea7c13c4b951888244ddafb512127b2c192075aeaf77a93ded3a1336e822abcfd83ebc8
-
SSDEEP
49152:KDjlabwz9PDjlabwz96f+wrja6tTPZYoUKm5OeNRwXIM2BfM3:6qwhqws+ia6tzZ1Zm5OmRwX0B+
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
7a976ca005082ab7acea1a46330935bfdfeedf70f37f1707122b7335fa7201ae.exe
-
Size
245KB
-
MD5
a3164b25a785cd6ebee79f42912c839b
-
SHA1
22bb441e4bbe64fd23c49a87a2e17133674a523a
-
SHA256
7a976ca005082ab7acea1a46330935bfdfeedf70f37f1707122b7335fa7201ae
-
SHA512
c450caeab4f87a32e8c277cbffff38556b3cc40b77b59e06c783541de3203b5b94356eb770e1c182c1a984b0ed31183824c2678e9bb6ce1290816b45cb8a2e2e
-
SSDEEP
3072:bloHvUQkoUEmxeoZUgOo8MPKEuH/tCYq05a4jJCCKE:bmvUQkoUEmxpZUgShCYqfsJ3
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
SKGHM_PE_757583588358839538539599593BeoersKnucklehead.vbs
-
Size
154KB
-
MD5
8993abe6fdbed5a58e5f8806cb1a12d8
-
SHA1
6f52e232be6a55b0411d2d2bf1e03b01b7388921
-
SHA256
1d6d36ec589cbecea839e3b4a5156a35f48436847043f2e1f307f6579e7893e2
-
SHA512
9de0b6554063778d0fec454f0fcb72acc5a1b652aff0f4513254097b6cfdce80c496e330ba93c2bacbabc5437fa508a124eb5e099c0e92dca2d7b70975090bd3
-
SSDEEP
3072:Gvn9Dm5IXdH7eAlsSyP/ioJbae+nzu6J5RcuXrMLyVZH4lY0Gx2gDwDjNMrt:Gvn9Dm5IXdH7ecsSyP/io9ae+nzu6J5j
Score8/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
-
-
Target
CV Elena Alba Garcia.exe
-
Size
635KB
-
MD5
af4c4394fd76d48c76265fa7393dbaf1
-
SHA1
d08fe29a6362e1416ea464766beb2e5120a8d347
-
SHA256
4c677969cde4b12fede4247e99653415ccf938d98d4958d99af13193cefab844
-
SHA512
fa0a58d48584e3547c643c5df0f2783ba73d584306630feb4a9abd32f583df48d25339ed964393e12c52717a33168c9e65ea6b58c6e6525d9ed216952a895738
-
SSDEEP
12288:Ia9PJCwxBS/ktL8picnoYgwkSpX3MBdkFIyFLkEseB7U5UjJJ++BzqyJM:ICPJCwi/+L84tSpHMBqGydkEseB4eJ+I
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
TEKLİF TALEP VE FİYAT TEKLİFİ_xlxs.exe
-
Size
602KB
-
MD5
b4b045a39da0b2d38940085d78d1ab14
-
SHA1
2678aa772b284a12488e7abdb5c9bab76a0bd9bf
-
SHA256
0477d366c3dce1723cf124fc263a85654b4454909dffcc0d325020f1187e4f34
-
SHA512
e2a13b0b7bfaf3c3a02672425de6a32d87e0a0cdb7c6439ba91bac53429d420ce602ac3654216add8ccf416ba58688388667233c2144941c07cfc318e8c35184
-
SSDEEP
12288:78ALbFN7nwPgrUd+N2qUouxL/8YpOrbW1wEW9XGGc5S0xquGjk+kJhDd:LLwIrw+oq9uxT8sOrbW1wEQXOS0RXd
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-
-
-
Target
fa396ba6c1ae4e9c786cff1a78012d86bd9a896f4999d4ba3b90864021fa806c.exe
-
Size
871KB
-
MD5
2abc28bccfd4512e91ac2b8f3537c307
-
SHA1
c5111761aeec5523798ebe82438a5064f58b9459
-
SHA256
fa396ba6c1ae4e9c786cff1a78012d86bd9a896f4999d4ba3b90864021fa806c
-
SHA512
07d92494e91c9502e33b76c2593ede82981ca6815bdfb1793b07331a8f86628fc5e56b1184eb1f80d78b74843289f5e042d200d75a298d084d0f2a035a7cfc22
-
SSDEEP
12288:i+19eRK6BdJ7Tv6u+ixobvDp6Aqxizx+6eH0Mmh+mbNGTE3/3PrfyqUQejzT6H0G:iC6B1+ixmpbqx
-
Enumerates VirtualBox registry keys
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Credential Access
Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1