General
-
Target
29032025_0130_Payment Confirmation Print Out Copy MT103.exe.iso
-
Size
764KB
-
Sample
250329-bw3pdsxmx7
-
MD5
25d275faf54828c1497c334b21e9b1ef
-
SHA1
3d6cd688655880b49315d2963a062dffa31180f2
-
SHA256
a47758975ed16796d090502afabe317e942f8ae955decb1fc756d43c33c56c11
-
SHA512
f20bbc8944988c6738b2c91687af63ae39d39b556b526702ae554603df8f37d5b5cf24fec814d882395e22f690d540839fdf9e2d90044e315fe2f7c1e5e84a81
-
SSDEEP
12288:jMQiKaxTR1Q8QTAI8vRPc6dWy2HF5VmChmFZKt5HQveM4uHzZNKf5zBnym+FNb/:AQib1qkIGRPc6kvVmTFwt9Qp3KBNym+D
Static task
static1
Behavioral task
behavioral1
Sample
Payment Confirmation Print Out Copy MT103.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Payment Confirmation Print Out Copy MT103.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.haliza.com.my - Port:
21 - Username:
[email protected] - Password:
JesusChrist007$
Extracted
Protocol: ftp- Host:
ftp.haliza.com.my - Port:
21 - Username:
[email protected] - Password:
JesusChrist007$
Targets
-
-
Target
Payment Confirmation Print Out Copy MT103.exe
-
Size
703KB
-
MD5
e5cd98a64f8e5107f0f9ce6b90613333
-
SHA1
1f1677af3f494b8def43775a9077357b756184d7
-
SHA256
aedfae05284600f51e6fe18a6f47ac68c7971e365d827bed7bc2205f27063c8d
-
SHA512
e948219debb7790b4ffe26cb9cecd155d2aec1a03a6fd368b49335c25ee24a6805bb3be466dfa099e193630aaec89270368a5294f386c8922e70d616498de024
-
SSDEEP
12288:yMQiKaxTR1Q8QTAI8vRPc6dWy2HF5VmChmFZKt5HQveM4uHzZNKf5zBnym+FNb/:BQib1qkIGRPc6kvVmTFwt9Qp3KBNym+D
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1