General
-
Target
9ea5024fa900f527b2f4457340ce4f1b4c3b3eb180175c176a6e3cd5b86b7e35.rar
-
Size
3.3MB
-
Sample
241125-c76e4atqfx
-
MD5
61e93ec20f6c788f968c87a480b49ce8
-
SHA1
674227ed2c9ed3042646f822236a88dfec5b0ba9
-
SHA256
9ea5024fa900f527b2f4457340ce4f1b4c3b3eb180175c176a6e3cd5b86b7e35
-
SHA512
94c94b965f1e7c406efebd2bdede76220eb56d541ecaedca9f5adb5f336f2868e99d8e8f2795c8c9bb788ea463c55f47a6302ccaee236a83d7205a535034c3d9
-
SSDEEP
98304:JsSTIuLBvZny6MF4f1sSgN8yY9qFA4FNuqhS:euLDyvFauPyEFNuWS
Behavioral task
behavioral1
Sample
PRODUCT LIST/DESIGN LOGO.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PRODUCT LIST/DESIGN LOGO.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
PRODUCT LIST/PRODUCT LIST.exe
Resource
win7-20240708-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7390139954:AAFw-89dzufZnN9iQ-qMJ7xuGsXRrzvXAEI/
Targets
-
-
Target
PRODUCT LIST/DESIGN LOGO.exe
-
Size
1.7MB
-
MD5
97042a029def0b48a06a31d39d32654f
-
SHA1
6ddba4f407409166bb39e03ba4d9ff528d38d636
-
SHA256
bf9d54dce88b260dbf1ce555bd7abdd98b030bb3ee2170d51272c1b0ec8605a0
-
SHA512
72f5a89e5c6e7d880c3d3bb39efea644cf402d80c6f9b9b771c2158e4e6095ec5aab9306aab8510a8b7bf1c7609f644fc8f24220e9260e247bbcdb3f07607e50
-
SSDEEP
49152:WA6OSh5GOieweChL9K+Dg0CoGIlcYtpGdb:WAzFh100CwG
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
PRODUCT LIST/PRODUCT LIST.exe
-
Size
1.7MB
-
MD5
a9b805862ccee6848ce91ef51a31f71d
-
SHA1
4ca749b30f879945324811f5924996765aa7d2e4
-
SHA256
9bdef064f9693bbae4a073b09a795c7b27e7486c10b3c7d920019ca3729bb434
-
SHA512
94b6cc887127129a3b51dd68b8d29e417a70e7538668f5bfb4d5e1769d74e2ce44dcef9f36ab6021e04fb1e78f710bcc859163e064d91793e5a3b756fe067d97
-
SSDEEP
24576:DRhMoSwfXo0P9Ej+zE2bb1SfyeeYF2yjfLV/JFzQXYiU4L/E/pWWG8WHHSx44s8/:DgNwfevYoaTerPtsYikWWG8GJ88Y6eb
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1