General
-
Target
Ningbo - Past Due Invoices.7z.001.7z
-
Size
594KB
-
Sample
240924-sb6nzstbqf
-
MD5
5f9eef815d1c7e0eddab42e0b8947399
-
SHA1
b4215b4db06737403c8f0071cbf80bc5b79bf6f6
-
SHA256
95fe9b80f0a241ea6c42d44234fd50951873d683c96bdab50c41d3e4f3452b6c
-
SHA512
c42759dc26df5cf8add0cab8bebae9893718825b7a4870710d19709b4bc6d24c030fee0370730bcb3a6d3a95a9c2342ed5536ad4587b6c4282a6683378133b72
-
SSDEEP
12288:VDyX0Y1O52DCRelYAeZjqjkazCtH2SQWkE5IxtMb7RYLgXEevG3UPt1tJU9k:BOy2DC0YwqH2SZWjMb7GEXRe3Id
Static task
static1
Behavioral task
behavioral1
Sample
Ningbo - Past Due Invoices.scr
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
BIGNAIRA2024 - Email To:
[email protected]
Targets
-
-
Target
Ningbo - Past Due Invoices.scr
-
Size
657KB
-
MD5
05971e8521240cd588015e689baab4b7
-
SHA1
1911d514d8e9d3310b2876ee591553250a31f44f
-
SHA256
d71f85d32dd19dd5a0c5ad3b97c3eba3277a5966035970a2c9ea7dd8e23fafa3
-
SHA512
01db290b831f6e60efaa8bfeb8bb0e1f1137c7843b29da34f024ee6e4f4b2f341ed4f8f2ed7c1a202a7a99781224bfca8bbaf7479ba23796707fc3d0d9994448
-
SSDEEP
12288:pOjsJrm2DORelTAeZjqjhazCtH42QWkn5IxQMj7RYLgXeevG3j8bQb:pWsJrm2DO0TvqH42ZLuMj7GEXze3UI
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-