General

  • Target

    PAYMENTCONFIRMATIONPRINTOUTCOPYMT103.EXE.exe

  • Size

    1.1MB

  • Sample

    250328-nlmawaxky5

  • MD5

    5c40710df63be4d2df4acea915477002

  • SHA1

    e70bdd344eb35cdb3be895b0f5d0649f266c1537

  • SHA256

    24d0058069dc570d1b9600034802fe93e90c7e1367e9001f7444f0dc9213ec11

  • SHA512

    8feb8adb9b047dc4b37f5fb94e2539c57a7cd0a6025312fdd12abcf2f6f008523f5166d70414fbf3fdaec6b8647ff68d9192c9e4fb66a1ad1012ca4a8b7e8f50

  • SSDEEP

    24576:5u6J33O0c+JY5UZ+XC0kGso6FaN5gf/dzVCK+aKi1ZWY:7u0c++OCvkGs9FaN5KxsKsY

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.haliza.com.my
  • Port:
    21
  • Username:
    origin@haliza.com.my
  • Password:
    JesusChrist007$

Targets

    • Target

      PAYMENTCONFIRMATIONPRINTOUTCOPYMT103.EXE.exe

    • Size

      1.1MB

    • MD5

      5c40710df63be4d2df4acea915477002

    • SHA1

      e70bdd344eb35cdb3be895b0f5d0649f266c1537

    • SHA256

      24d0058069dc570d1b9600034802fe93e90c7e1367e9001f7444f0dc9213ec11

    • SHA512

      8feb8adb9b047dc4b37f5fb94e2539c57a7cd0a6025312fdd12abcf2f6f008523f5166d70414fbf3fdaec6b8647ff68d9192c9e4fb66a1ad1012ca4a8b7e8f50

    • SSDEEP

      24576:5u6J33O0c+JY5UZ+XC0kGso6FaN5gf/dzVCK+aKi1ZWY:7u0c++OCvkGs9FaN5KxsKsY

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.