General
-
Target
e86d7e7a74ade70a2517322f13057592_JaffaCakes118
-
Size
373KB
-
Sample
240918-f88tdsveme
-
MD5
e86d7e7a74ade70a2517322f13057592
-
SHA1
afe4d0efbc06f047a449be51acc12d304e8ff19a
-
SHA256
c3e498526855f562e010a1b734b56dc34a7a055ea16a49d4d511507026dea8ee
-
SHA512
56fea7f7891be939d7a8b7bece6ed12628048dfa2dcacb7c2bfa47bd8bc46a93a7a19d037e9b5ec2b9645f69e988acb286fc4cdaed13fd6e4bb41e2075c60562
-
SSDEEP
6144:op9HYQh6PokQQqpiLyI6q3kHHOObJ9qGj6twbzdphFRq9bwrein6wm1jBl5l:oprhEokjqwLd38bHqHwfhFRq9SnlgjT
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT COPY 24092020_pdf.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
SWIFT COPY 24092020_pdf.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iigcest.com - Port:
587 - Username:
[email protected] - Password:
Jab2016@
Targets
-
-
Target
SWIFT COPY 24092020_pdf.exe
-
Size
444KB
-
MD5
c2ab834e47610c082360d87f4d613c2c
-
SHA1
6ac56cf22e21f35068a1652af02ee12b115d7341
-
SHA256
cc0362a0c84cc29c65b62af19019e3a810d69ffc46e5e40b08aedbe333659cd7
-
SHA512
383a1d3e2c75cb31942eb2a5b33a3b01bb47126f4392362140295468243d8df1c7b0884d54203713a28a657bf3e6152909e2fdd7508df8178f3a24b9239ce3d4
-
SSDEEP
6144:bLZSBSGmmrpO/iKrDh74Fr1M9oeGIZCauQqpuisS98W74EonWLL7wueU1BkG8:bLZsLUiKdkRtNpuijv4YL7j17S
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
2Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1