General
-
Target
KASHI SHIP PARTICULARS.pdf.scr.exe
-
Size
941KB
-
Sample
241216-qcmw6a1lfv
-
MD5
42555dbdcc01fddb6e68265cc5704b5b
-
SHA1
543e5153ad0bc094841e40330567ac8e9abb2d48
-
SHA256
2b1c8e28590c81630fe3c284857734161139c1998cdd28e899cd1049bf5fff0d
-
SHA512
027029b37e79edf8f5156e6d651c5aca4608a6ccad14eac33c32a0c92b4814f43c59ae1f46fba454d21af6d5de9fcbd8f6a6b99bd4db2c7d19915adf9416107f
-
SSDEEP
12288:I2dhHhAIqUmkY/Tz9P+okSieKdNBJrC2lZNYheNhlK:5dhBArUmxrBP+BSGdC2lQeFK
Static task
static1
Behavioral task
behavioral1
Sample
KASHI SHIP PARTICULARS.pdf.scr.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://beirutrest.com - Port:
21 - Username:
[email protected] - Password:
9yXQ39wz(uL+
Extracted
Protocol: ftp- Host:
beirutrest.com - Port:
21 - Username:
[email protected] - Password:
9yXQ39wz(uL+
Targets
-
-
Target
KASHI SHIP PARTICULARS.pdf.scr.exe
-
Size
941KB
-
MD5
42555dbdcc01fddb6e68265cc5704b5b
-
SHA1
543e5153ad0bc094841e40330567ac8e9abb2d48
-
SHA256
2b1c8e28590c81630fe3c284857734161139c1998cdd28e899cd1049bf5fff0d
-
SHA512
027029b37e79edf8f5156e6d651c5aca4608a6ccad14eac33c32a0c92b4814f43c59ae1f46fba454d21af6d5de9fcbd8f6a6b99bd4db2c7d19915adf9416107f
-
SSDEEP
12288:I2dhHhAIqUmkY/Tz9P+okSieKdNBJrC2lZNYheNhlK:5dhBArUmxrBP+BSGdC2lQeFK
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1