General
-
Target
0a6fa1e9dfa042839d231bf4a509b549918279f4254dbe43f4bdce2b809a7d26
-
Size
651KB
-
Sample
240831-gg86hsydqj
-
MD5
6570d1c44420f737996f41bd45d7af29
-
SHA1
9b2b95549e1fec030ed2e9dc54e9e90a42d4751b
-
SHA256
0a6fa1e9dfa042839d231bf4a509b549918279f4254dbe43f4bdce2b809a7d26
-
SHA512
584870e2d4331401f16bbf118129fd1dfdb1a1dc37df1dfe97467e1862dc5fd0cf432ff5f328527a2a389bf2df2047020c72ccb2b71b85faa5746881a569802f
-
SSDEEP
12288:5OubcG0jZKI3gS8Lo91EJDu2wvyD+BxmX59Qte9sQdjNnpK7:5OuAGuK0EJg+5CtMho
Static task
static1
Behavioral task
behavioral1
Sample
MT TBA VESSELPARTICULARS_PDF.scr
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
MT TBA VESSELPARTICULARS_PDF.scr
Resource
win10v2004-20240802-en
Malware Config
Extracted
Protocol: ftp- Host:
cash4cars.nz - Port:
21 - Username:
[email protected] - Password:
-[([pqM~nGA4
Extracted
agenttesla
Protocol: ftp- Host:
ftp://cash4cars.nz - Port:
21 - Username:
[email protected] - Password:
-[([pqM~nGA4
Targets
-
-
Target
MT TBA VESSELPARTICULARS_PDF.scr
-
Size
727KB
-
MD5
bceaca06a407a610bf6aa5478c73464d
-
SHA1
d96a8006d6ac538c84c5936c175b1786193f1dea
-
SHA256
468fdf7f7ac681b8ad34959240f8a8dfebaaddcbd2a0915a762ee086f23fd4eb
-
SHA512
8df7c314bc471f373de97814a9644185eeb05537562822142508ec020b03c8a128aa84d8f79c1093e6cb50cd1f91de55ad99adbd9424050c0ae99381f979b0ab
-
SSDEEP
12288:J0UTvVVxAqTzOW6T9ESBDm0wrI6dVaIfuwd7UDZiHesi9wzde:bXxlzOW6TuSB660aIfJKDZYesi9
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1