General
-
Target
960db67081f8b25865698988f9758d0c80a7601c8326902eb52d1fe8ae6b9f0e
-
Size
1.0MB
-
Sample
240720-bfm9rszakn
-
MD5
9decd029a7800230daaae693cd48c6af
-
SHA1
6b5133eed57881bbfaef4f18dece5299b8879d5e
-
SHA256
960db67081f8b25865698988f9758d0c80a7601c8326902eb52d1fe8ae6b9f0e
-
SHA512
f229700238de5b0b4c7da31d60f4bdd5ce2b4d8a60ca3f5fb15ca6f7f46f9daddd2218b9660ee30e4a1cf1126194dddd2996831e0afacfa3c9cbd71c32f733dd
-
SSDEEP
24576:CcatvGcxvi4KVNYIejOQJBZc80oOv0MapS3awJLGgvZV:ctrxvi44g3x0ouapSr5zRV
Behavioral task
behavioral1
Sample
224cb722a3b940c564dd0f4e6347776a6ebd2ce4d1ce898cc16769a8ec079b1a.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
224cb722a3b940c564dd0f4e6347776a6ebd2ce4d1ce898cc16769a8ec079b1a.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
purchase order - PO-011024-201.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
purchase order - PO-011024-201.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
manlikeyou88 - Email To:
[email protected]
Extracted
redline
bigpay
204.10.160.140:7001
Targets
-
-
Target
224cb722a3b940c564dd0f4e6347776a6ebd2ce4d1ce898cc16769a8ec079b1a.exe
-
Size
140KB
-
MD5
1baba2d74f12915a3b89ecb883315008
-
SHA1
c45b81ab4753eafe6d5f0e0ce9623c79e888a8df
-
SHA256
224cb722a3b940c564dd0f4e6347776a6ebd2ce4d1ce898cc16769a8ec079b1a
-
SHA512
7a4597bb7c8c058c0171cde6c341e74fab5754b1b0054117b3cdd016837cc37ea4609de36638eadf1bc52bbf64fdce2cde6302898bff4546729721e3ce311277
-
SSDEEP
3072:B2rwPGZSiq413j9DE0CA6DWkJZz8qjOYRwRcTvRB8Z4PHjnCp:c5ZSsQ0RAXkYRLnCp
Score1/10 -
-
-
Target
purchase order - PO-011024-201.exe
-
Size
975KB
-
MD5
fb5123fc6707fe4e06c962b5aa7d8f1d
-
SHA1
a06b21030a4dcd1b9e987c13742be49540c5ee46
-
SHA256
7306a090c8afd7557dc6a32f072937107058f5d14b5d416730b189647980b757
-
SHA512
a7261913938b0acf68b74a7ab54ada022f27e33ecdd5c07d6cdb7d939ab2ee0dbfafa6548fc022f2e08e796200df7fbce49a913bad1182d1772cc5d3a3235c5a
-
SSDEEP
24576:+2BL9SiKt1yowjwQ9Bj+20sOZgSGnS3ewqm:+2BL9SiA81N0seGnS3q
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-