General
-
Target
Payment Confirmation.tgz
-
Size
1.4MB
-
Sample
240909-mn992swcqe
-
MD5
2bc5967a4572a0769946334c029c493d
-
SHA1
bd2435f60ffd4fb02e34aced9cd06fc207012768
-
SHA256
15693cf14766d409168118becf49cbb60cd20b506ffce14b0e509b589a56d232
-
SHA512
c8b1d74dd84ddd7dac4d2adf30474e7e62a220f063b55131073b8cb7772779bad26b0f6d0f88a7bd0f4a6e33b2207eb4f96b11554231c9cc1e2ef4e51812d35e
-
SSDEEP
12288:NHgdK9Rt6xOvEWXfW4rLOA0fGq0oV0HEeM/s8gXw/dR92:NAdKIxsfWAL2fvwHEUXXwv92
Static task
static1
Behavioral task
behavioral1
Sample
Payment Confirmation.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Payment Confirmation.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7000875199:AAGcJDBHFcfVUBvhBO4xZLw34OXk1NWXSe0/
Targets
-
-
Target
Payment Confirmation.exe
-
Size
810.6MB
-
MD5
026d2f0bc075aea5b674ee8c8e28c062
-
SHA1
50be7a17f99f47b288aa507a4f4b8175046af7be
-
SHA256
dd6792c5b40433f5fa1e59f4e4b5c067c3f0986346904f9c6fe23bc61ca720a2
-
SHA512
2bc047bc5a32cda240887d8cd19d9aa579e419e268a2678733673e33665fbaa681daaad9e82f4f108702763d4e8eaec03e1f15691d81d1b7add5d3fe0fb01ece
-
SSDEEP
12288:E5MFKLltmvsXEuXfHgYxJig3Qt5qUu34HE1YQ/e9i72l:VFKOv0fHgYxJigKHE1YQWkE
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1