General
-
Target
PAYMENT CONFIRMATION PRINT OUT COPY MT103.EXE.exe
-
Size
1.1MB
-
Sample
250328-ncqxpsvwfw
-
MD5
5c40710df63be4d2df4acea915477002
-
SHA1
e70bdd344eb35cdb3be895b0f5d0649f266c1537
-
SHA256
24d0058069dc570d1b9600034802fe93e90c7e1367e9001f7444f0dc9213ec11
-
SHA512
8feb8adb9b047dc4b37f5fb94e2539c57a7cd0a6025312fdd12abcf2f6f008523f5166d70414fbf3fdaec6b8647ff68d9192c9e4fb66a1ad1012ca4a8b7e8f50
-
SSDEEP
24576:5u6J33O0c+JY5UZ+XC0kGso6FaN5gf/dzVCK+aKi1ZWY:7u0c++OCvkGs9FaN5KxsKsY
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT CONFIRMATION PRINT OUT COPY MT103.EXE.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PAYMENT CONFIRMATION PRINT OUT COPY MT103.EXE.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.haliza.com.my - Port:
21 - Username:
[email protected] - Password:
JesusChrist007$
Targets
-
-
Target
PAYMENT CONFIRMATION PRINT OUT COPY MT103.EXE.exe
-
Size
1.1MB
-
MD5
5c40710df63be4d2df4acea915477002
-
SHA1
e70bdd344eb35cdb3be895b0f5d0649f266c1537
-
SHA256
24d0058069dc570d1b9600034802fe93e90c7e1367e9001f7444f0dc9213ec11
-
SHA512
8feb8adb9b047dc4b37f5fb94e2539c57a7cd0a6025312fdd12abcf2f6f008523f5166d70414fbf3fdaec6b8647ff68d9192c9e4fb66a1ad1012ca4a8b7e8f50
-
SSDEEP
24576:5u6J33O0c+JY5UZ+XC0kGso6FaN5gf/dzVCK+aKi1ZWY:7u0c++OCvkGs9FaN5KxsKsY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1