General
-
Target
68dbfd08096c96ab06c30bd78cc60fc425b00351883a0f3184e325dc4382d29a
-
Size
664KB
-
Sample
240917-swwphsseln
-
MD5
bc66701c546d5f340cc27db2f410cf82
-
SHA1
f3a03102350f017242a221c8fd8e82f512b6786b
-
SHA256
68dbfd08096c96ab06c30bd78cc60fc425b00351883a0f3184e325dc4382d29a
-
SHA512
a5d032c488d0e9e26e9f4e79fa8cfd6fb2bcda844d0bd0c1202b4298a4ec1496696fc2a4675664d7b8841f35582cc775e641cd3d3d39b6dbc68415dc1138b77a
-
SSDEEP
12288:EzYhVB6v2XY2AdIVrQkpewRWayyydsQBRu9PiWBlqo7V7C6e3H+WsD/6gYAE1HHs:EzLTLyrxyryydcPiWBlqoB75osTXYAks
Static task
static1
Behavioral task
behavioral1
Sample
Overdue SOA [$17,627.60 , $1,901.84].pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Overdue SOA [$17,627.60 , $1,901.84].pdf.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.haliza.com.my - Port:
21 - Username:
[email protected] - Password:
JesusChrist007$
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.haliza.com.my - Port:
21 - Username:
[email protected] - Password:
JesusChrist007$
Targets
-
-
Target
Overdue SOA [$17,627.60 , $1,901.84].pdf.exe
-
Size
824KB
-
MD5
c991a8217596055cce58ed79a64151bf
-
SHA1
037c8106669679714552835ba6264679e67a4780
-
SHA256
6612efeec1b0def9aa050c0d92f98edc78e91d4a6e955f8645034d6deb928529
-
SHA512
b379d650bb3213a5e1830589d712f3f080e2bd70bfb178452ab0368da7ae0befa68d50578ae2663c82bca695ee4e00beb6f458c6b3b64c1a8750c3668e23404e
-
SSDEEP
24576:qeq30rAk83vFL2rBtfb9jVNd7xoaTwUy9qcXk:PrAr3NaXpl1H9bb
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1