General

  • Target

    36e1270f45700bbd043326fbb3c85cd66c400ee8fe4a780a6fbdac0d2ac38dd5.zip

  • Size

    948KB

  • Sample

    240721-sd9teswdmp

  • MD5

    81e6a78e040ce5ae1dfca40bdd5f80a5

  • SHA1

    8cd038dc6c6552eeb4e06d89fc1f98739594e446

  • SHA256

    3e4f746a98221cfd5e325e8373e851295ef69fd0fd537efef511a814105fc371

  • SHA512

    392540cc50edb94384b0a68a9a66fd1ba6189d336b6ba4b9889835b13bbada0bad943c60e10ce3a1bd17ad06372cb83bd24d7cd69a1c6d438ac3635486adf8ff

  • SSDEEP

    24576:OfCUS03wwyAyNJ/mvDY4u4oIssImntLxhhELndTsZDyuEkpoaJb:YCUPSNQ7YV4oIemnt9hmLuZyu7poE

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Family

redline

Botnet

bigpay

C2

204.10.160.140:7001

Targets

    • Target

      purchase order - PO-011024-201.exe

    • Size

      975KB

    • MD5

      fb5123fc6707fe4e06c962b5aa7d8f1d

    • SHA1

      a06b21030a4dcd1b9e987c13742be49540c5ee46

    • SHA256

      7306a090c8afd7557dc6a32f072937107058f5d14b5d416730b189647980b757

    • SHA512

      a7261913938b0acf68b74a7ab54ada022f27e33ecdd5c07d6cdb7d939ab2ee0dbfafa6548fc022f2e08e796200df7fbce49a913bad1182d1772cc5d3a3235c5a

    • SSDEEP

      24576:+2BL9SiKt1yowjwQ9Bj+20sOZgSGnS3ewqm:+2BL9SiA81N0seGnS3q

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Executes dropped EXE

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks