General

  • Target

    PO-04375KTG.vbs

  • Size

    313KB

  • Sample

    221206-htan6adf25

  • MD5

    92cf45fd34496ac41434463f0d02f4a0

  • SHA1

    d5027385be35f4ac68b622aa993b9a568ac16ac4

  • SHA256

    0cfb6932e490ea78f85fcd57fc9bda95f274867dfd0dbcb3515bb1f7009626b4

  • SHA512

    80597f875019d1fc4ff7999de22c355309bc15cde17195ada4bc4be5501240c84a82e8e657446684a8ac4de3b26af5e04121abe6cb98fdcb4f610163fb6f176b

  • SSDEEP

    6144:x+YqqUnWShek49zVzVi+9/Pwy/4qXeV0b6bEWAChB/BpKhp69:50Tl43zViQFeuriB/B2U

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      PO-04375KTG.vbs

    • Size

      313KB

    • MD5

      92cf45fd34496ac41434463f0d02f4a0

    • SHA1

      d5027385be35f4ac68b622aa993b9a568ac16ac4

    • SHA256

      0cfb6932e490ea78f85fcd57fc9bda95f274867dfd0dbcb3515bb1f7009626b4

    • SHA512

      80597f875019d1fc4ff7999de22c355309bc15cde17195ada4bc4be5501240c84a82e8e657446684a8ac4de3b26af5e04121abe6cb98fdcb4f610163fb6f176b

    • SSDEEP

      6144:x+YqqUnWShek49zVzVi+9/Pwy/4qXeV0b6bEWAChB/BpKhp69:50Tl43zViQFeuriB/B2U

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Collection

Email Collection

1
T1114

Command and Control

Web Service

1
T1102

Tasks