General
-
Target
3f3d26e4222fe2207b6588eb3672db62c595f20d0e81a18acdb85afb5a30dbfa.7z
-
Size
561KB
-
Sample
240830-bp9jcssakp
-
MD5
19de96f412a3f3498b8bba389399f812
-
SHA1
d9d8c7f5f30c98bd4bd56745b0666e12661dad5c
-
SHA256
3f3d26e4222fe2207b6588eb3672db62c595f20d0e81a18acdb85afb5a30dbfa
-
SHA512
b628a9b2781f51ad9647476e0be27fb357ca5b9174296316689134eb4e2d3336399d7352f365f048778170332638dd02df640f035dd91dbe1cada6c9b852e3de
-
SSDEEP
12288:K/4gxlPOP24AQoPK4ADZlxF3dTduhDJ//StF43kSUNaX2tNiKTLX0Dc+L:K/BxlPOe4ZZ7F3dTURJ//EOVUNQWXQcY
Static task
static1
Behavioral task
behavioral1
Sample
Great Wall Motor Sale Bank_Sift_Copy.Pdf.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Great Wall Motor Sale Bank_Sift_Copy.Pdf.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
Asaprocky11 - Email To:
[email protected]
Targets
-
-
Target
Great Wall Motor Sale Bank_Sift_Copy.Pdf.exe
-
Size
1.2MB
-
MD5
2884d53826b824a28cfbc4ebefabf549
-
SHA1
6968dbd0d1cedf3bdba126eb784974cbc0e4d2bd
-
SHA256
1a0c97c25e5ff8c862717d45f566659b76014262e3f8aa2867683f6f62af9be0
-
SHA512
3e6e5de3b0b36f4d3ca4a33193077706038d1bbaeb6fb1a0a6c4a40af501b814ce261a0f7fc4ac321680bc615eda459b09f4540f47a8ecec2fe2e8af2c04ff80
-
SSDEEP
24576:ZZj9DS5AM4OF+PMwrSVlbmfDYkhDvGtjXtGUAF9kJ7MqudghfEuCj0hThiHHxlhs:ZZ4Mw7nx
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1