Overview
overview
10Static
static
564055c54f4...85.zip
windows10-ltsc_2021-x64
64055c54f4...85.zip
windows7-x64
64055c54f4...85.zip
windows10-2004-x64
64055c54f4...85.zip
windows10-ltsc_2021-x64
64055c54f4...85.zip
windows11-21h2-x64
64055c54f4...85.zip
android-13-x64
64055c54f4...85.zip
android-13-x64
64055c54f4...85.zip
macos-10.15-amd64
64055c54f4...85.zip
ubuntu-18.04-amd64
64055c54f4...85.zip
debian-9-armhf
64055c54f4...85.zip
debian-9-mips
64055c54f4...85.zip
debian-9-mipsel
Enquiry_MC...ns.rar
windows10-2004-x64
Enquiry_MC...ns.rar
windows7-x64
Enquiry_MC...ns.rar
windows10-2004-x64
Enquiry_MC...ns.rar
windows10-ltsc_2021-x64
Enquiry_MC...ns.rar
windows11-21h2-x64
Enquiry_MC...ns.rar
android-9-x86
Enquiry_MC...ns.rar
android-13-x64
Enquiry_MC...ns.rar
macos-10.15-amd64
Enquiry_MC...ns.rar
ubuntu-18.04-amd64
Enquiry_MC...ns.rar
debian-9-armhf
Enquiry_MC...ns.rar
debian-9-mips
Enquiry_MC...ns.rar
debian-9-mipsel
Enquiry_MC...ns.exe
windows10-2004-x64
10Enquiry_MC...ns.exe
windows7-x64
10Enquiry_MC...ns.exe
windows10-2004-x64
10Enquiry_MC...ns.exe
windows10-ltsc_2021-x64
10Enquiry_MC...ns.exe
windows11-21h2-x64
10Enquiry_MC...ns.exe
android-10-x64
Enquiry_MC...ns.exe
android-13-x64
Enquiry_MC...ns.exe
macos-10.15-amd64
Analysis
-
max time kernel
22s -
max time network
63s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 04:24
Static task
static1
Behavioral task
behavioral1
Sample
64055c54f4c3e3719cb81fad43a2236f472f58f555d92377dec479b43cb78c85.zip
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral2
Sample
64055c54f4c3e3719cb81fad43a2236f472f58f555d92377dec479b43cb78c85.zip
Resource
win7-20250207-en
Behavioral task
behavioral3
Sample
64055c54f4c3e3719cb81fad43a2236f472f58f555d92377dec479b43cb78c85.zip
Resource
win10v2004-20250314-en
Behavioral task
behavioral4
Sample
64055c54f4c3e3719cb81fad43a2236f472f58f555d92377dec479b43cb78c85.zip
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral5
Sample
64055c54f4c3e3719cb81fad43a2236f472f58f555d92377dec479b43cb78c85.zip
Resource
win11-20250314-en
Behavioral task
behavioral6
Sample
64055c54f4c3e3719cb81fad43a2236f472f58f555d92377dec479b43cb78c85.zip
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral7
Sample
64055c54f4c3e3719cb81fad43a2236f472f58f555d92377dec479b43cb78c85.zip
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral8
Sample
64055c54f4c3e3719cb81fad43a2236f472f58f555d92377dec479b43cb78c85.zip
Resource
macos-20241106-en
Behavioral task
behavioral9
Sample
64055c54f4c3e3719cb81fad43a2236f472f58f555d92377dec479b43cb78c85.zip
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral10
Sample
64055c54f4c3e3719cb81fad43a2236f472f58f555d92377dec479b43cb78c85.zip
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral11
Sample
64055c54f4c3e3719cb81fad43a2236f472f58f555d92377dec479b43cb78c85.zip
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral12
Sample
64055c54f4c3e3719cb81fad43a2236f472f58f555d92377dec479b43cb78c85.zip
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral13
Sample
Enquiry_MC452543-Materials&Specifications.rar
Resource
win10v2004-20250314-en
Behavioral task
behavioral14
Sample
Enquiry_MC452543-Materials&Specifications.rar
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
Enquiry_MC452543-Materials&Specifications.rar
Resource
win10v2004-20250314-en
Behavioral task
behavioral16
Sample
Enquiry_MC452543-Materials&Specifications.rar
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral17
Sample
Enquiry_MC452543-Materials&Specifications.rar
Resource
win11-20250313-en
Behavioral task
behavioral18
Sample
Enquiry_MC452543-Materials&Specifications.rar
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral19
Sample
Enquiry_MC452543-Materials&Specifications.rar
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral20
Sample
Enquiry_MC452543-Materials&Specifications.rar
Resource
macos-20241101-en
Behavioral task
behavioral21
Sample
Enquiry_MC452543-Materials&Specifications.rar
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral22
Sample
Enquiry_MC452543-Materials&Specifications.rar
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral23
Sample
Enquiry_MC452543-Materials&Specifications.rar
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral24
Sample
Enquiry_MC452543-Materials&Specifications.rar
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral25
Sample
Enquiry_MC452543-Materials&Specifications.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral26
Sample
Enquiry_MC452543-Materials&Specifications.exe
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
Enquiry_MC452543-Materials&Specifications.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral28
Sample
Enquiry_MC452543-Materials&Specifications.exe
Resource
win10ltsc2021-20250313-en
Behavioral task
behavioral29
Sample
Enquiry_MC452543-Materials&Specifications.exe
Resource
win11-20250313-en
Behavioral task
behavioral30
Sample
Enquiry_MC452543-Materials&Specifications.exe
Resource
android-x64-20240910-en
Behavioral task
behavioral31
Sample
Enquiry_MC452543-Materials&Specifications.exe
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral32
Sample
Enquiry_MC452543-Materials&Specifications.exe
Resource
macos-20241101-en
General
-
Target
Enquiry_MC452543-Materials&Specifications.exe
-
Size
1.6MB
-
MD5
ca0b81ee2b114368e18273b47bdb44bc
-
SHA1
0aca85249c528d2c3bfa7e73ae03a8610a131d54
-
SHA256
712177390e5c001579f04f887e88dfe49c62233cbc8ec0ccafb0b334d5cbc177
-
SHA512
86a50506d15e04358f01c85217457ae086a3796af7b1fdcc5b40680f96ac29f3192f1275aa0e3b0cb45ddd9d4dc5dc701c685ed92991d25c49fee641abce4d37
-
SSDEEP
49152:iu0c++OCvkGs9FamAKHFrZLGKGY5rQAkYY:tB3vkJ9gKfLG3DAV
Malware Config
Extracted
redline
success
204.10.161.147:7082
Extracted
agenttesla
Protocol: smtp- Host:
mail.xma0.com - Port:
587 - Username:
[email protected] - Password:
london@1759 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral26/files/0x00070000000175cc-66.dat family_redline behavioral26/memory/2968-68-0x0000000000DA0000-0x0000000000DF2000-memory.dmp family_redline -
Redline family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbs neophobia.exe -
Executes dropped EXE 3 IoCs
pid Process 2824 neophobia.exe 2308 Origin_rawfile.exe 2968 build.exe -
Loads dropped DLL 3 IoCs
pid Process 2448 Enquiry_MC452543-Materials&Specifications.exe 2892 svchost.exe 2892 svchost.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ip-api.com -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral26/files/0x0007000000017546-9.dat autoit_exe behavioral26/memory/2824-22-0x0000000000A10000-0x0000000000BA9000-memory.dmp autoit_exe behavioral26/memory/2824-28-0x0000000000A10000-0x0000000000BA9000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2824 set thread context of 2892 2824 neophobia.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Enquiry_MC452543-Materials&Specifications.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neophobia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Origin_rawfile.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2308 Origin_rawfile.exe 2308 Origin_rawfile.exe 2968 build.exe 2968 build.exe 2968 build.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2824 neophobia.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2892 svchost.exe Token: SeDebugPrivilege 2308 Origin_rawfile.exe Token: SeDebugPrivilege 2968 build.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2448 Enquiry_MC452543-Materials&Specifications.exe 2448 Enquiry_MC452543-Materials&Specifications.exe 2824 neophobia.exe 2824 neophobia.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2448 Enquiry_MC452543-Materials&Specifications.exe 2448 Enquiry_MC452543-Materials&Specifications.exe 2824 neophobia.exe 2824 neophobia.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2308 Origin_rawfile.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2824 2448 Enquiry_MC452543-Materials&Specifications.exe 30 PID 2448 wrote to memory of 2824 2448 Enquiry_MC452543-Materials&Specifications.exe 30 PID 2448 wrote to memory of 2824 2448 Enquiry_MC452543-Materials&Specifications.exe 30 PID 2448 wrote to memory of 2824 2448 Enquiry_MC452543-Materials&Specifications.exe 30 PID 2824 wrote to memory of 2892 2824 neophobia.exe 31 PID 2824 wrote to memory of 2892 2824 neophobia.exe 31 PID 2824 wrote to memory of 2892 2824 neophobia.exe 31 PID 2824 wrote to memory of 2892 2824 neophobia.exe 31 PID 2824 wrote to memory of 2892 2824 neophobia.exe 31 PID 2892 wrote to memory of 2308 2892 svchost.exe 32 PID 2892 wrote to memory of 2308 2892 svchost.exe 32 PID 2892 wrote to memory of 2308 2892 svchost.exe 32 PID 2892 wrote to memory of 2308 2892 svchost.exe 32 PID 2892 wrote to memory of 2968 2892 svchost.exe 33 PID 2892 wrote to memory of 2968 2892 svchost.exe 33 PID 2892 wrote to memory of 2968 2892 svchost.exe 33 PID 2892 wrote to memory of 2968 2892 svchost.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Enquiry_MC452543-Materials&Specifications.exeC:\Users\Admin\AppData\Local\Temp\Enquiry_MC452543-Materials&Specifications.exe bcdedit /c set shutdown /r readonly /f force /t 21⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\contrapose\neophobia.exeC:\Users\Admin\AppData\Local\Temp\Enquiry_MC452543-Materials&Specifications.exe bcdedit /c set shutdown /r readonly /f force /t 22⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\svchost.exeC:\Users\Admin\AppData\Local\Temp\Enquiry_MC452543-Materials&Specifications.exe bcdedit /c set shutdown /r readonly /f force /t 23⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\Origin_rawfile.exe"C:\Users\Admin\AppData\Local\Temp\Origin_rawfile.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2308
-
-
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD53edff8f7a6912d8e716903174487b77f
SHA15a5c01a933218192bea3da11b6f5d01601b7723c
SHA2562386f8b71f47befd0dc493b373333a04735749dedc4a12240e47ea5930f85184
SHA51283fd183717fa031a2d8a0f3e30de55f9645e66189cdb88cdb7e488e0180e82d6d7eb3699efcd646af71c9781a32e4dd74acb532a8c074d5046f658eded76fc18
-
Filesize
300KB
MD5209b15fade618af5831e6e2528a4fedc
SHA12efc49db01f3df2c1cd0a528c75e466a9478b698
SHA256f07a706c0554ed9363bd396dd49f788a0df232caf0af01161d831a12b95d964d
SHA5123431efa0cfe6c2262ed07a9fe084567d9548e586efcfa752e0cec455e07f8a3e6b3acacacef77317881a0682358cf92d37abad80730560c33cb1e2d564afa8be
-
Filesize
721KB
MD55e77274e0be1809ae481437134498b50
SHA1b5931c36e3fa09467ce825ef1c8f30f5c79ebc6d
SHA256016b9db117fe3b465427beef551d93b3474e29ba577067029a07e8fd573c9c87
SHA5129987fffa3bea0185355d812e05aded29aded4970e3fa6d483bb6da4de3af7687ce9868038398a02f3389bfcc221645bef0c058be938630fc85b6aa08e5e44914
-
Filesize
1.6MB
MD5ca0b81ee2b114368e18273b47bdb44bc
SHA10aca85249c528d2c3bfa7e73ae03a8610a131d54
SHA256712177390e5c001579f04f887e88dfe49c62233cbc8ec0ccafb0b334d5cbc177
SHA51286a50506d15e04358f01c85217457ae086a3796af7b1fdcc5b40680f96ac29f3192f1275aa0e3b0cb45ddd9d4dc5dc701c685ed92991d25c49fee641abce4d37