General

  • Target

    justificante de transferencia.vbs

  • Size

    618KB

  • Sample

    221026-qt62csfhdj

  • MD5

    a680fa06014f0e4b59400e504a0b2ac8

  • SHA1

    f227a15109ff6bdb257aca65b7110e732c1b202a

  • SHA256

    2306a2393700d869d279c9d3c4c78abdef3dad4dc657eccfa154dbc8291dd86f

  • SHA512

    ae5a7482afc358ed65790af6e8acdb27bac01017417242548f6ae56c2ea1fbdacdbf5d6094bfd31e3569e28a24b052fb57b3e559c8d01feec4ecf08e8f66d0ed

  • SSDEEP

    12288:L1Ixm5SxvSkGovu61srFjTXdhBc/4ZEeBQf7Dl3CH8auI:L1x5Ykt66r1dbRhQvlQuI

Malware Config

Targets

    • Target

      justificante de transferencia.vbs

    • Size

      618KB

    • MD5

      a680fa06014f0e4b59400e504a0b2ac8

    • SHA1

      f227a15109ff6bdb257aca65b7110e732c1b202a

    • SHA256

      2306a2393700d869d279c9d3c4c78abdef3dad4dc657eccfa154dbc8291dd86f

    • SHA512

      ae5a7482afc358ed65790af6e8acdb27bac01017417242548f6ae56c2ea1fbdacdbf5d6094bfd31e3569e28a24b052fb57b3e559c8d01feec4ecf08e8f66d0ed

    • SSDEEP

      12288:L1Ixm5SxvSkGovu61srFjTXdhBc/4ZEeBQf7Dl3CH8auI:L1x5Ykt66r1dbRhQvlQuI

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks