General
-
Target
c8dc82c83a24c9050ec86751b8f08d627bac0020a0d93f649a73c2acb45d00e1
-
Size
1.4MB
-
Sample
250227-k2faqatm17
-
MD5
12479acf6bb8926bc295927f9bf9b042
-
SHA1
d0a524cc5685bd91dc79a43c9b5007a40d65234a
-
SHA256
c8dc82c83a24c9050ec86751b8f08d627bac0020a0d93f649a73c2acb45d00e1
-
SHA512
aeb430c67747822e99f044e474592764b0802dabb408ffd6b67df6045f7dc7e5cc8868fc814d8758bd4772c40d391aab7103e64aafe1358f2b620e6370df2cbf
-
SSDEEP
24576:EE+Ro6/S2Pq6aVMwl3f9+DVVwatHzuCiLfHEM5bWgnJEgm256qZdUdk/aIKuxBVf:mRJq2i6aOwl31+RiatHzJizR5he21Zaw
Static task
static1
Behavioral task
behavioral1
Sample
Covid 19 Immunity Tips.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Covid 19 Immunity Tips.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
COVID-19 WHO RECOMENDED V.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
COVID-19 WHO RECOMENDED V.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
AWARENESS NOTICE ON CORONAVIRUS COVID-19 DOCUMENT_pdf.exe
Resource
win7-20241023-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
cr*fDaW&m@2y6u
Extracted
agenttesla
Protocol: smtp- Host:
smtp.bnb-spa.com - Port:
587 - Username:
[email protected] - Password:
hope2020
Extracted
lokibot
https://academydea.com/alhaji/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Covid 19 Immunity Tips.exe
-
Size
388KB
-
MD5
76fffeef410bd6b633c09c0f6529891d
-
SHA1
774a51b0b07a7c606672a669fca5939b25b53e66
-
SHA256
e4e5c3a6c15beff4e17117075e2c0bd65f176d81e6885134d2b4d97c20d4773a
-
SHA512
1fca78852d9ba98ae4ee2ade1694038e6da6fa2d1e29a82e859f6963d6d86b4247da70c7f9780e0ea36f7f7dff178de9c55a450e528c30a073ebbff94423a3d4
-
SSDEEP
12288:HTYFk+FX3k1xJo2X/S2v4WAqhafvUT1Pk9J7y:Hck+RMxJX/S2vOgaf6c
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
-
-
Target
COVID-19 WHO RECOMENDED V.exe
-
Size
378KB
-
MD5
1179a7989031fc4b6331505b388dcb12
-
SHA1
eb644752ffb7d9b12511a0d10448150c91eb30bd
-
SHA256
d150feb631d6e9050b7fb76db57504e6dcc2715fe03e45db095f50d56a9495a5
-
SHA512
c21193698a03259eb486ebfb281e4c8fb7224814fd81d9d676c3ff8f7c9ebb8f277ef03cf5025b648e88849cca8731d16b7735288e49b0bf04da9336b4279b31
-
SSDEEP
6144:0QT73Grj0u1H+DTqKXKqYpwGspOzo5R7dhV0iyIwu5CfQxt/vVauu1fmLA3Kjx4b:rTDu0a+DnHpOAHVtyIV5cQXHUuuU+6Bw
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
AWARENESS NOTICE ON CORONAVIRUS COVID-19 DOCUMENT_pdf.exe
-
Size
1.1MB
-
MD5
9498ba71b33e9e9e19c352579e0d1b0a
-
SHA1
39419cf0c4a2aec86db7e87aaecf2972ed7cddb6
-
SHA256
da26ba1e13ce4702bd5154789ce1a699ba206c12021d9823380febd795f5b002
-
SHA512
780d617fc6fd03bd54bfe8fdad3dea57e558a7b06d03304d77fc2cf7c7dac584bea844c15e3afd6416bb3bd1266c7287864571eb3cacf2aa014b0a5a381561e0
-
SSDEEP
24576:8tb20pkaCqT5TBWgNQ7a369EIqcxl/KXm6A:lVg5tQ7a36F/B5
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1