Resubmissions

25-02-2021 00:21

210225-efba8ycx12 10

General

  • Target

    DOC.ppt

  • Size

    141KB

  • Sample

    210225-efba8ycx12

  • MD5

    53f09cdb89620ee0d02c006d5bdf758f

  • SHA1

    caf1ff6f5563d23eac7c547f2309c0608ae3029f

  • SHA256

    a9194b2dc593c73598cc95b3b1aad400910f48225e527dc61159300be44651ca

  • SHA512

    60374ee268f24ce193c860caf5ccf779a94388f44923bf2ecd5ba3273dfe937c4d8f960cdd906f56eccd39a81623636a2b07c22f116de8f1ee48cbe5f89b8a94

Malware Config

Targets

    • Target

      DOC.ppt

    • Size

      141KB

    • MD5

      53f09cdb89620ee0d02c006d5bdf758f

    • SHA1

      caf1ff6f5563d23eac7c547f2309c0608ae3029f

    • SHA256

      a9194b2dc593c73598cc95b3b1aad400910f48225e527dc61159300be44651ca

    • SHA512

      60374ee268f24ce193c860caf5ccf779a94388f44923bf2ecd5ba3273dfe937c4d8f960cdd906f56eccd39a81623636a2b07c22f116de8f1ee48cbe5f89b8a94

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • AgentTesla Payload

    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Remote System Discovery

1
T1018

Tasks