General

  • Target

    7931c850bdda4b2d1de759d7c39e7bdb34fee5bfd1e829bf278a443a756078a3

  • Size

    673KB

  • Sample

    191025-myxerjbgfx

  • MD5

    b4adbbe65ad0f10a5ec66d85306f0667

  • SHA1

    1f399aaf5fdd46fa523800413666e133aceb3b29

  • SHA256

    7931c850bdda4b2d1de759d7c39e7bdb34fee5bfd1e829bf278a443a756078a3

  • SHA512

    5fe3edab58ca38f351c326bbde983bcafefc98f254bfc10386eb12b51821b5aa116b805f887be4fc644838d061742012b04b7883275f6e5f48c39a1a3e8f0724

Score
10/10

Malware Config

Targets

    • Target

      7931c850bdda4b2d1de759d7c39e7bdb34fee5bfd1e829bf278a443a756078a3

    • Size

      673KB

    • MD5

      b4adbbe65ad0f10a5ec66d85306f0667

    • SHA1

      1f399aaf5fdd46fa523800413666e133aceb3b29

    • SHA256

      7931c850bdda4b2d1de759d7c39e7bdb34fee5bfd1e829bf278a443a756078a3

    • SHA512

      5fe3edab58ca38f351c326bbde983bcafefc98f254bfc10386eb12b51821b5aa116b805f887be4fc644838d061742012b04b7883275f6e5f48c39a1a3e8f0724

    Score
    10/10
    • agenttesla family

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run entry to start application

    • Checks system information in the registry (likely anti-VM)

    • Modifies service

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Modify Existing Service

1
T1031

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

3
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks