General

  • Target

    c8dc82c83a24c9050ec86751b8f08d627bac0020a0d93f649a73c2acb45d00e1

  • Size

    1.4MB

  • Sample

    250227-k2faqatm17

  • MD5

    12479acf6bb8926bc295927f9bf9b042

  • SHA1

    d0a524cc5685bd91dc79a43c9b5007a40d65234a

  • SHA256

    c8dc82c83a24c9050ec86751b8f08d627bac0020a0d93f649a73c2acb45d00e1

  • SHA512

    aeb430c67747822e99f044e474592764b0802dabb408ffd6b67df6045f7dc7e5cc8868fc814d8758bd4772c40d391aab7103e64aafe1358f2b620e6370df2cbf

  • SSDEEP

    24576:EE+Ro6/S2Pq6aVMwl3f9+DVVwatHzuCiLfHEM5bWgnJEgm256qZdUdk/aIKuxBVf:mRJq2i6aOwl31+RiatHzJizR5he21Zaw

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.ru
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    cr*fDaW&m@2y6u

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.bnb-spa.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    hope2020

Extracted

Family

lokibot

C2

https://academydea.com/alhaji/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Covid 19 Immunity Tips.exe

    • Size

      388KB

    • MD5

      76fffeef410bd6b633c09c0f6529891d

    • SHA1

      774a51b0b07a7c606672a669fca5939b25b53e66

    • SHA256

      e4e5c3a6c15beff4e17117075e2c0bd65f176d81e6885134d2b4d97c20d4773a

    • SHA512

      1fca78852d9ba98ae4ee2ade1694038e6da6fa2d1e29a82e859f6963d6d86b4247da70c7f9780e0ea36f7f7dff178de9c55a450e528c30a073ebbff94423a3d4

    • SSDEEP

      12288:HTYFk+FX3k1xJo2X/S2v4WAqhafvUT1Pk9J7y:Hck+RMxJX/S2vOgaf6c

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Target

      COVID-19 WHO RECOMENDED V.exe

    • Size

      378KB

    • MD5

      1179a7989031fc4b6331505b388dcb12

    • SHA1

      eb644752ffb7d9b12511a0d10448150c91eb30bd

    • SHA256

      d150feb631d6e9050b7fb76db57504e6dcc2715fe03e45db095f50d56a9495a5

    • SHA512

      c21193698a03259eb486ebfb281e4c8fb7224814fd81d9d676c3ff8f7c9ebb8f277ef03cf5025b648e88849cca8731d16b7735288e49b0bf04da9336b4279b31

    • SSDEEP

      6144:0QT73Grj0u1H+DTqKXKqYpwGspOzo5R7dhV0iyIwu5CfQxt/vVauu1fmLA3Kjx4b:rTDu0a+DnHpOAHVtyIV5cQXHUuuU+6Bw

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • AgentTesla payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • Target

      AWARENESS NOTICE ON CORONAVIRUS COVID-19 DOCUMENT_pdf.exe

    • Size

      1.1MB

    • MD5

      9498ba71b33e9e9e19c352579e0d1b0a

    • SHA1

      39419cf0c4a2aec86db7e87aaecf2972ed7cddb6

    • SHA256

      da26ba1e13ce4702bd5154789ce1a699ba206c12021d9823380febd795f5b002

    • SHA512

      780d617fc6fd03bd54bfe8fdad3dea57e558a7b06d03304d77fc2cf7c7dac584bea844c15e3afd6416bb3bd1266c7287864571eb3cacf2aa014b0a5a381561e0

    • SSDEEP

      24576:8tb20pkaCqT5TBWgNQ7a369EIqcxl/KXm6A:lVg5tQ7a36F/B5

MITRE ATT&CK Enterprise v15

Tasks