General
-
Target
Inquiry from Nilvik International .zip
-
Size
652KB
-
Sample
240711-nalvzawerf
-
MD5
cfbc5694249de9f0be9a10333cf57022
-
SHA1
bcd5f896c41fe168f28ed5deb6c345838f5c2276
-
SHA256
a4c95da51ebddbee1b9968b7a5e26245578ce2e8c53b999d0f13f5d626c1f15b
-
SHA512
df71eba2770fa5cbc0b048baf6725c56221324685abbc0a1d4c6cb68111dc39d9a9f418a624ccfa63ccec31c1e63809c9a7bba12d4c980e390f50d58daf400a5
-
SSDEEP
12288:d1ypWIGFpAY426c9OhVuPg3Ev9/Qc+0Qz4osvXLqk0XYdg5C9bp9gR:XIGbCc9OhINvmcXY4oqbMYdg5C9Q
Static task
static1
Behavioral task
behavioral1
Sample
Inquiry from Nilvik International .exe
Resource
win7-20240705-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.merlinmotorworks.com - Port:
587 - Username:
[email protected] - Password:
Merlin1080S - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.merlinmotorworks.com - Port:
587 - Username:
[email protected] - Password:
Merlin1080S
Targets
-
-
Target
Inquiry from Nilvik International .bat
-
Size
777KB
-
MD5
982ee42beb94bcf0b6773d7b4c8cb8a4
-
SHA1
36ac2ca431c40a6065d5b7bf261b7058d6cf301d
-
SHA256
4d44c596269b8a73cebb5fc18337a997efab6907f6be48d8db2f115cd205f968
-
SHA512
9da8006f9dc16f4f38245a673ef0db51ddcc33bb6658c3de014fdcabda84758e19178cbe09ea45c1e7ad26b07426e8f7588452845c921a0bca68b0eae6c146bb
-
SSDEEP
12288:ldRgYVK+orvWDDLKszb9rEEJRfQc+cKz4oeLXLwBjiidgxVIZOq9iHUakR:lLg1+BPJWc/a4oabCjJdgxVIZtg05
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-