General
-
Target
RNSM00479.7z
-
Size
21.3MB
-
Sample
240919-xt4pkavgjb
-
MD5
b6e444e7c20e89a31a628c02157bd831
-
SHA1
7498c626f496a9518bb6505f0345ef51d590bfad
-
SHA256
f601b997c28d8d1a9886fb86b87e695746a48a67dbb164907069e08536099305
-
SHA512
7ef09c84d09181e1fea2fd50533387131a1e946839e062697f1b21ce06b98cd7c636861d45b9fe465afccf0ac7267ba5af336b2f98170b5bde44030fbe9def43
-
SSDEEP
393216:uvDGD2prGJ+yxS+zNp/d1Z1OiZZtDrxzVjW0cJNxitYEgg2bzkJ/8qApYBm0HukR:uv6D2pkiiNpLOiDtDrF1zcJHiSsoz4k0
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00479.7z
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.clarisse.us - Port:
587 - Username:
[email protected] - Password:
d)9TY@Xe9f38fL
Extracted
njrat
im523
Smoke
192.168.0.122:1604
3ecd3edb0a06926279c0501e832883f9
-
reg_key
3ecd3edb0a06926279c0501e832883f9
-
splitter
|'|'|
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.30.235
218.54.31.165
112.175.88.207
112.175.88.208
Extracted
F:\3NRxISFx1.README.txt
blackmatter
http://blackmax7su6mbwtcyo3xwtpfxpm356jjqrs34y4crcytpw7mifuedyd.onion/72oJjilhMD/6d067a8741848166fa2ac1e69472280c
http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/X3452I2VDTHM30QX
Targets
-
-
Target
RNSM00479.7z
-
Size
21.3MB
-
MD5
b6e444e7c20e89a31a628c02157bd831
-
SHA1
7498c626f496a9518bb6505f0345ef51d590bfad
-
SHA256
f601b997c28d8d1a9886fb86b87e695746a48a67dbb164907069e08536099305
-
SHA512
7ef09c84d09181e1fea2fd50533387131a1e946839e062697f1b21ce06b98cd7c636861d45b9fe465afccf0ac7267ba5af336b2f98170b5bde44030fbe9def43
-
SSDEEP
393216:uvDGD2prGJ+yxS+zNp/d1Z1OiZZtDrxzVjW0cJNxitYEgg2bzkJ/8qApYBm0HukR:uv6D2pkiiNpLOiDtDrF1zcJHiSsoz4k0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
BlackMatter Ransomware
BlackMatter ransomware group claims to be Darkside and REvil succesor.
-
GandCrab payload
-
AgentTesla payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
3