General
-
Target
TRQ.exe
-
Size
275KB
-
Sample
240807-pae8vsydkp
-
MD5
a3ef7b3db56fd834a3f6e7f5260514b0
-
SHA1
c79968b34032964457b7c9873318c11ac30f8149
-
SHA256
3cc42cf175f5db337fec2f980b847dc58bd9a62c23830d8797e5bb05e5c69030
-
SHA512
6064084d39fe9d824d1a83a0d5e4414295580e91b138823c7a4a297e5ab8b54e80ee18bfd46f5f74a5c09220e1dddc7eee05a1d424e20c7711db6f3edd47adba
-
SSDEEP
3072:sr85CT4IAOerTxPmOI4fgXHNh5Pr8bN4gDuiICmKG:k9T4IAOerTxPmOtfg3Nf8bWfiICXG
Behavioral task
behavioral1
Sample
TRQ.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
TRQ.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6983892140:AAFuDvnVBnkxRmQB8di3AZt-LndssiFsj94/
Targets
-
-
Target
TRQ.exe
-
Size
275KB
-
MD5
a3ef7b3db56fd834a3f6e7f5260514b0
-
SHA1
c79968b34032964457b7c9873318c11ac30f8149
-
SHA256
3cc42cf175f5db337fec2f980b847dc58bd9a62c23830d8797e5bb05e5c69030
-
SHA512
6064084d39fe9d824d1a83a0d5e4414295580e91b138823c7a4a297e5ab8b54e80ee18bfd46f5f74a5c09220e1dddc7eee05a1d424e20c7711db6f3edd47adba
-
SSDEEP
3072:sr85CT4IAOerTxPmOI4fgXHNh5Pr8bN4gDuiICmKG:k9T4IAOerTxPmOtfg3Nf8bWfiICXG
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1