General
-
Target
RNSM00422.7z
-
Size
15.8MB
-
Sample
241027-tnshkaxkg1
-
MD5
89d6c2eb7075a803f32f961cd0a84fa6
-
SHA1
fe2b68e4cebd253682638996261d02c8337a7a46
-
SHA256
351e791501d38c3670ea34996879efd92c921df3296077dd25d972b4790e4e5f
-
SHA512
260f1346264064fc4b0ba25594c184c93017c47b7af6135d726e0c560d1d90e6395bc02ec7da6d90497562ddeac52d0efa8ef05fb5d67af98732d51270e347ec
-
SSDEEP
393216:L+XTElA+HgPV6LWfLsTgFJ7YCqmCllCVT+TwKz+OQN1ZHA:K4VHwV7LRKLEkK7Zg
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00422.7z
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\Contacts\read_me_lkdtt.txt
http://x6gjpqs4jjvgpfvhghdz2dk7be34emyzluimticj5s5fexf4wa65ngad.onion/0c04b15081595448821e25e8dd07423d9927fa54cd56d8797ea4d1315a682692
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
mmm777
Targets
-
-
Target
RNSM00422.7z
-
Size
15.8MB
-
MD5
89d6c2eb7075a803f32f961cd0a84fa6
-
SHA1
fe2b68e4cebd253682638996261d02c8337a7a46
-
SHA256
351e791501d38c3670ea34996879efd92c921df3296077dd25d972b4790e4e5f
-
SHA512
260f1346264064fc4b0ba25594c184c93017c47b7af6135d726e0c560d1d90e6395bc02ec7da6d90497562ddeac52d0efa8ef05fb5d67af98732d51270e347ec
-
SSDEEP
393216:L+XTElA+HgPV6LWfLsTgFJ7YCqmCllCVT+TwKz+OQN1ZHA:K4VHwV7LRKLEkK7Zg
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
HelloKitty Ransomware
Ransomware family which has been active since late 2020, and in early 2021 a variant compromised the CDProjektRed game studio.
-
Hellokitty family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence
-
Modiloader family
-
Xmrig family
-
AgentTesla payload
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
ModiLoader Second Stage
-
Renames multiple (160) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
XMRig Miner payload
-
Adds policy Run key to start application
-
Disables RegEdit via registry modification
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Hijack Execution Flow: Executable Installer File Permissions Weakness
Possible Turn off User Account Control's privilege elevation for standard users.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1File and Directory Permissions Modification
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Impair Defenses
2Disable or Modify Tools
1Safe Mode Boot
1Indicator Removal
1File Deletion
1Modify Registry
6Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1