General

  • Target

    Inquiry from Nilvik International .zip

  • Size

    652KB

  • Sample

    240711-nalvzawerf

  • MD5

    cfbc5694249de9f0be9a10333cf57022

  • SHA1

    bcd5f896c41fe168f28ed5deb6c345838f5c2276

  • SHA256

    a4c95da51ebddbee1b9968b7a5e26245578ce2e8c53b999d0f13f5d626c1f15b

  • SHA512

    df71eba2770fa5cbc0b048baf6725c56221324685abbc0a1d4c6cb68111dc39d9a9f418a624ccfa63ccec31c1e63809c9a7bba12d4c980e390f50d58daf400a5

  • SSDEEP

    12288:d1ypWIGFpAY426c9OhVuPg3Ev9/Qc+0Qz4osvXLqk0XYdg5C9bp9gR:XIGbCc9OhINvmcXY4oqbMYdg5C9Q

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.merlinmotorworks.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Merlin1080S

Targets

    • Target

      Inquiry from Nilvik International .bat

    • Size

      777KB

    • MD5

      982ee42beb94bcf0b6773d7b4c8cb8a4

    • SHA1

      36ac2ca431c40a6065d5b7bf261b7058d6cf301d

    • SHA256

      4d44c596269b8a73cebb5fc18337a997efab6907f6be48d8db2f115cd205f968

    • SHA512

      9da8006f9dc16f4f38245a673ef0db51ddcc33bb6658c3de014fdcabda84758e19178cbe09ea45c1e7ad26b07426e8f7588452845c921a0bca68b0eae6c146bb

    • SSDEEP

      12288:ldRgYVK+orvWDDLKszb9rEEJRfQc+cKz4oeLXLwBjiidgxVIZOq9iHUakR:lLg1+BPJWc/a4oabCjJdgxVIZtg05

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks