General
-
Target
4491ab2dd10abb8f8b32f24d5e8f71ec78b8bf9ca99b99f8b3d02e71a37a8117
-
Size
648KB
-
Sample
240911-y3k49a1bpq
-
MD5
7058cf1abb1b00cfe62a900a5e0c5332
-
SHA1
c45f2606499917a7f643795a66b447e9b0e1c4fe
-
SHA256
4491ab2dd10abb8f8b32f24d5e8f71ec78b8bf9ca99b99f8b3d02e71a37a8117
-
SHA512
f0fbcc60ad490509d94ff3694444325f5f76f5cb9d377b4aa79b2cc21cec904301701c714d6e458305ec63f70be783583006587f0fd241a0f8073209497e5204
-
SSDEEP
12288:ty5eagr8JfrCkWkv2lQrruF5wagF3JJlPkSwx95KiC/r:tyAtRkWkegre5waevlPkSwoiy
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Inquiry PO_20248099-1 12,300PCS.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Purchase Inquiry PO_20248099-1 12,300PCS.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.haliza.com.my - Port:
21 - Username:
[email protected] - Password:
JesusChrist007$
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.haliza.com.my - Port:
21 - Username:
[email protected] - Password:
JesusChrist007$
Targets
-
-
Target
Purchase Inquiry PO_20248099-1 12,300PCS.exe
-
Size
743KB
-
MD5
a78235c0b974b8fcc0cfdec48040962b
-
SHA1
0b731bf6aba71b88d545a1629b4255b485e18e59
-
SHA256
0bf2e649cea88d4c52b3554f02fa3c22228242e6946601e5284a4fadc1101fdf
-
SHA512
e75e8059e4089133eb89033507b0b1a0846bb6c568c410b7ef990c88e9160b5765473812b6c5bdd2a2f20304423edce153aafd700695e8ddd91b1a0ab6ecb356
-
SSDEEP
12288:qrUYvsrIBuq55wtnWrCUWkv2NQrruT5w22FoRDnNQCFuG4qMmW2G7CWt:QNUrfAWUWkeIrC5w2TNQg94ZEGB
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1