General
-
Target
166e81a662c9411d0c7cce9405ca208d79b1a00d5e241ddb9b7c80024c8b6e2a
-
Size
667KB
-
Sample
240909-kdkkjayhqk
-
MD5
ee4d281a682c314cecd6dd66c85bcf13
-
SHA1
2128b914f6a5dc69226b65196b26a0d40c390b2f
-
SHA256
166e81a662c9411d0c7cce9405ca208d79b1a00d5e241ddb9b7c80024c8b6e2a
-
SHA512
da668abbebd814d3c72ebc1c2cc2549e6aee0ea4c630b0f889bd31db494803b8570bacf92006e87eda662b7eab173ed74b5ba9d8379b44e2e6e943148dd8ba69
-
SSDEEP
12288:6HBmDxheb5B2zXbpYh7QTgq/ETq786UII0s1QE9SSXQ6RHsHHrtRKq7qdhn1ok:6YDxk5YXtiMlA9IIT1QcSSXRUHqsqok
Static task
static1
Behavioral task
behavioral1
Sample
CG230511007 double ring.pdf.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
CG230511007 double ring.pdf.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
manlikeyou88 - Email To:
[email protected]
Targets
-
-
Target
CG230511007 double ring.pdf.bat
-
Size
698KB
-
MD5
4a2d8f6fac5f95fc384c689d9a5927a2
-
SHA1
97ad59b9532706d2457eb10f6902b5e2f9442566
-
SHA256
44c35217277fbfdde4251ac9c9bad106247b6f5ca5ca0f1dbaf8f3343b364af0
-
SHA512
43d2340d3f49c138b9c0f880617f4f730837c8983fa4a254b16ecbaa5dfef38c1643a657cf04962e9897c56fa561ede9181e3be23d24510e8cf9e186bf77cdd2
-
SSDEEP
12288:FzjLf30WH0IieBhVpz60zapdl4VOqXEkOdu+VGBecnFj8AzPmZ:djj0yyeb/5+lfk8iFFj8MPm
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1