General
-
Target
964b626022ea083fe9624f88d0371fa01fb6b3b4fa081e880d88a05bbf0654b3
-
Size
666KB
-
Sample
241016-btxelawaqg
-
MD5
0cc41f127fab597085bc6125dfc809f2
-
SHA1
1e36ce6c9d40f959628739b740e4e30cd4afa0b7
-
SHA256
964b626022ea083fe9624f88d0371fa01fb6b3b4fa081e880d88a05bbf0654b3
-
SHA512
2482ec6a288163d8fd55abced05ba885c65f88fc5b5de8bc81a987bd25dd855de2f22428125f264dec9a6ab3ffb7d8b55339147c68642a1bac6c37832e1a7e15
-
SSDEEP
12288:ONBi378Ezq6mFhbL5RGDuLHsomyplHD1YE5c9dJmsOZAjGQB7F0PgvD5Fb7E:ONg37Hq6iNLGsHcejj5c96ZOGQMPgNpE
Static task
static1
Behavioral task
behavioral1
Sample
964b626022ea083fe9624f88d0371fa01fb6b3b4fa081e880d88a05bbf0654b3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
964b626022ea083fe9624f88d0371fa01fb6b3b4fa081e880d88a05bbf0654b3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Haarvksten/Nomenklaturerne.ps1
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Haarvksten/Nomenklaturerne.ps1
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.ionos.es - Port:
587 - Username:
[email protected] - Password:
luiyis353173 - Email To:
[email protected]
Targets
-
-
Target
964b626022ea083fe9624f88d0371fa01fb6b3b4fa081e880d88a05bbf0654b3
-
Size
666KB
-
MD5
0cc41f127fab597085bc6125dfc809f2
-
SHA1
1e36ce6c9d40f959628739b740e4e30cd4afa0b7
-
SHA256
964b626022ea083fe9624f88d0371fa01fb6b3b4fa081e880d88a05bbf0654b3
-
SHA512
2482ec6a288163d8fd55abced05ba885c65f88fc5b5de8bc81a987bd25dd855de2f22428125f264dec9a6ab3ffb7d8b55339147c68642a1bac6c37832e1a7e15
-
SSDEEP
12288:ONBi378Ezq6mFhbL5RGDuLHsomyplHD1YE5c9dJmsOZAjGQB7F0PgvD5Fb7E:ONg37Hq6iNLGsHcejj5c96ZOGQMPgNpE
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
Haarvksten/Nomenklaturerne.Bac
-
Size
53KB
-
MD5
67517d72ac10b11f81aa07fc2f994275
-
SHA1
71d255f09b46f34093786eec160120e6383b2f8c
-
SHA256
0af4117e1ded224818ab4c741022f2179af74cc0cf9fcc640efb73746baf4fe4
-
SHA512
1c1054233b654d8831c114b0f009a095a49c8805b13a2d756e5eedec477cddb2608ed0012b040a8736916e3226a5aebb4425eb6f3ee02e4338afe9816b923afe
-
SSDEEP
768:GTPdZlcIXV5loyDhTeT2qroJOgR08h5IhTviGxm83oq/VHDpbnVHxDy0V0DoinD2:GTlrcslmrrfS5IBiG+eJhr6/nA3l
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1