General
-
Target
1016403202.cmd
-
Size
4.5MB
-
Sample
250403-nzr4aaymt5
-
MD5
e5c9920ae6eea67428c0acda90f6a5a9
-
SHA1
d9929aeff92b1e019f02616c06a12ff0ecbcc184
-
SHA256
d879e51fe3bcd5d2d0c147eb82453a1e513ae9daba471017951897c81777593a
-
SHA512
a28359623458077f6d43cf41d8bbf826b9f76ed406d15daf1136ae389dd05de2d78ab9a7844200a3e8669592a1843f0518b6cc433b28a817b62ab4e6010a7f43
-
SSDEEP
49152:JvFG+6Aq/2kz4//k2sSh6KkJctutTKULH1mohKhp7c2nX4dj9ZnbHX0g5x5LOUqb:P
Static task
static1
Behavioral task
behavioral1
Sample
1016403202.cmd
Resource
win10v2004-20250314-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.bugarinovictransport.com - Port:
21 - Username:
[email protected] - Password:
b^^tO[Yo7(TE
Targets
-
-
Target
1016403202.cmd
-
Size
4.5MB
-
MD5
e5c9920ae6eea67428c0acda90f6a5a9
-
SHA1
d9929aeff92b1e019f02616c06a12ff0ecbcc184
-
SHA256
d879e51fe3bcd5d2d0c147eb82453a1e513ae9daba471017951897c81777593a
-
SHA512
a28359623458077f6d43cf41d8bbf826b9f76ed406d15daf1136ae389dd05de2d78ab9a7844200a3e8669592a1843f0518b6cc433b28a817b62ab4e6010a7f43
-
SSDEEP
49152:JvFG+6Aq/2kz4//k2sSh6KkJctutTKULH1mohKhp7c2nX4dj9ZnbHX0g5x5LOUqb:P
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2