General
-
Target
4b8d34bd0e6359981828bd8df963ea5ec84c4a3be7ccf013743cc6f87173f41a.tar
-
Size
700KB
-
Sample
240908-cvsy8s1hrc
-
MD5
f2ae3a8f854703302e202828440123ad
-
SHA1
1dddc1309aa38f34ba8d857d639144817cf1286f
-
SHA256
4b8d34bd0e6359981828bd8df963ea5ec84c4a3be7ccf013743cc6f87173f41a
-
SHA512
23d8f6c09b1a9eecadfa6c02e62c4e280653c5a71dcd83990892b26675c7003ee8ff7bdcc2bdfaf94a75c48c82948f3c0a7262c61e3db29ca69b866ac16ac535
-
SSDEEP
12288:wzjLf30WH0IieBhVpz60zapdl4VOqXEkOdu+VGBecnFj8AzPmZ:ujj0yyeb/5+lfk8iFFj8MPm
Static task
static1
Behavioral task
behavioral1
Sample
CG230511007 double ring.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CG230511007 double ring.pdf.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
manlikeyou88 - Email To:
[email protected]
Targets
-
-
Target
CG230511007 double ring.pdf.bat
-
Size
698KB
-
MD5
4a2d8f6fac5f95fc384c689d9a5927a2
-
SHA1
97ad59b9532706d2457eb10f6902b5e2f9442566
-
SHA256
44c35217277fbfdde4251ac9c9bad106247b6f5ca5ca0f1dbaf8f3343b364af0
-
SHA512
43d2340d3f49c138b9c0f880617f4f730837c8983fa4a254b16ecbaa5dfef38c1643a657cf04962e9897c56fa561ede9181e3be23d24510e8cf9e186bf77cdd2
-
SSDEEP
12288:FzjLf30WH0IieBhVpz60zapdl4VOqXEkOdu+VGBecnFj8AzPmZ:djj0yyeb/5+lfk8iFFj8MPm
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1