General
-
Target
ShippingDoc.exe.xz
-
Size
644KB
-
Sample
241002-wn9syszbqj
-
MD5
98dcb2f078419d3917f2697e856d03bc
-
SHA1
2e7f0b548f449c726dbfd66d2a3f324203d463b0
-
SHA256
8276ec632025ab4adc6d3b6a32bf1401f73a30b88d8e17980d8c2c6078ab1d21
-
SHA512
bb1e2ff4c2bcd30d207aaba97f29dbd2cc81d9c65d54c466571e26d7a03247ac57ba2bcc82e2c87017aa074a5bf59e2debe4f260b3a082957afe51cdcfb4155c
-
SSDEEP
12288:Q9/Aw1gU9qdWx2Cbwcsx/uNvCfgLvPQtEN+LQd9vgY27JCl3GrdAJ7AR/haxjI:2YVUodI2Px/uNv7YN9CsrKpAR4x8
Static task
static1
Behavioral task
behavioral1
Sample
ShippingDoc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ShippingDoc.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.maidenstride.com - Port:
587 - Username:
[email protected] - Password:
Cpanel@0567105829 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.maidenstride.com - Port:
587 - Username:
[email protected] - Password:
Cpanel@0567105829
Targets
-
-
Target
ShippingDoc.exe
-
Size
728KB
-
MD5
7858dec6223dc72c8977faced34dbad2
-
SHA1
87d7ad899537df7c2709476266c0fe387b36edc2
-
SHA256
f144b191383b7726b06d19dfa8c025e5ab14af97977cf1a7acf5b267d1e15a53
-
SHA512
1f6ecc7752f7d5ffbdc050d940ab072957f35c44b8d0b8b2a94de109c9cb6fde664e1ad06dff2ec8eba67f31d7a32556b97899b9ea6416b3738668eaca847266
-
SSDEEP
12288:dK+89qAWx2tbw9sx/HNv9fgLvPNtEN+LQd0vgY27Jtl3G4dAJ7ChFbdi0C0emD:dK7oAI2Nx/HNvUvK9ts4KpChS0TD
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1