General
-
Target
1db59ed1e56e9a9297c864706ae0b8fa57dcbdb16f3ca16d8fb8e0fc1168bb37.rar
-
Size
650KB
-
Sample
240830-bk994azemb
-
MD5
fbad858e934ea3102790a2e5d9c863ee
-
SHA1
edba9f54a6e167f89f9c3689fa8a07cfbf672bda
-
SHA256
1db59ed1e56e9a9297c864706ae0b8fa57dcbdb16f3ca16d8fb8e0fc1168bb37
-
SHA512
a0268ebc83f35693183b47344fe3d20a2cd373c0e0346b62d78a12cc1cee806ad60c079496e1ba89bb3d58e2bf18144e312255267e48bd856e2c105607a3d585
-
SSDEEP
12288:SDJHbYIqNqTIKpVR6PbWP7IJK6IN2GoPUuIpIWg3RtsoMK:y8NO5l4yIc6I6PUgWghGK
Static task
static1
Behavioral task
behavioral1
Sample
MT TBA VESSELPARTICULARS_PDF.scr
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
MT TBA VESSELPARTICULARS_PDF.scr
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://cash4cars.nz - Port:
21 - Username:
[email protected] - Password:
-[([pqM~nGA4
Extracted
Protocol: ftp- Host:
cash4cars.nz - Port:
21 - Username:
[email protected] - Password:
-[([pqM~nGA4
Targets
-
-
Target
MT TBA VESSELPARTICULARS_PDF.scr
-
Size
727KB
-
MD5
bceaca06a407a610bf6aa5478c73464d
-
SHA1
d96a8006d6ac538c84c5936c175b1786193f1dea
-
SHA256
468fdf7f7ac681b8ad34959240f8a8dfebaaddcbd2a0915a762ee086f23fd4eb
-
SHA512
8df7c314bc471f373de97814a9644185eeb05537562822142508ec020b03c8a128aa84d8f79c1093e6cb50cd1f91de55ad99adbd9424050c0ae99381f979b0ab
-
SSDEEP
12288:J0UTvVVxAqTzOW6T9ESBDm0wrI6dVaIfuwd7UDZiHesi9wzde:bXxlzOW6TuSB660aIfJKDZYesi9
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1