General
-
Target
36e1270f45700bbd043326fbb3c85cd66c400ee8fe4a780a6fbdac0d2ac38dd5.zip
-
Size
948KB
-
Sample
240721-sd9teswdmp
-
MD5
81e6a78e040ce5ae1dfca40bdd5f80a5
-
SHA1
8cd038dc6c6552eeb4e06d89fc1f98739594e446
-
SHA256
3e4f746a98221cfd5e325e8373e851295ef69fd0fd537efef511a814105fc371
-
SHA512
392540cc50edb94384b0a68a9a66fd1ba6189d336b6ba4b9889835b13bbada0bad943c60e10ce3a1bd17ad06372cb83bd24d7cd69a1c6d438ac3635486adf8ff
-
SSDEEP
24576:OfCUS03wwyAyNJ/mvDY4u4oIssImntLxhhELndTsZDyuEkpoaJb:YCUPSNQ7YV4oIemnt9hmLuZyu7poE
Static task
static1
Behavioral task
behavioral1
Sample
purchase order - PO-011024-201.exe
Resource
win10-20240404-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
manlikeyou88 - Email To:
[email protected]
Extracted
redline
bigpay
204.10.160.140:7001
Targets
-
-
Target
purchase order - PO-011024-201.exe
-
Size
975KB
-
MD5
fb5123fc6707fe4e06c962b5aa7d8f1d
-
SHA1
a06b21030a4dcd1b9e987c13742be49540c5ee46
-
SHA256
7306a090c8afd7557dc6a32f072937107058f5d14b5d416730b189647980b757
-
SHA512
a7261913938b0acf68b74a7ab54ada022f27e33ecdd5c07d6cdb7d939ab2ee0dbfafa6548fc022f2e08e796200df7fbce49a913bad1182d1772cc5d3a3235c5a
-
SSDEEP
24576:+2BL9SiKt1yowjwQ9Bj+20sOZgSGnS3ewqm:+2BL9SiA81N0seGnS3q
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1