General

  • Target

    DHL Original Document.exe

  • Size

    579KB

  • Sample

    230317-krlprafc36

  • MD5

    7ce5957d016bc558a8aa30c3f28e30d4

  • SHA1

    16be243943b88ddb768298f2370f583dcffc2211

  • SHA256

    efa6869eaa796429cbd684b030cb6873262f6009997fe6f4c20ebd69b4ad54b6

  • SHA512

    c8178c07a5222bbcd7076a33d91f36dc7fc310a140f775909e7ffe7caab185493409d375d2099a73737a4e091efa1a141af4bde2a7aceaba5d7122037d5533f4

  • SSDEEP

    12288:9AbaXvQ2opbrGunDF6S9Dp9g2okqVvujHW7vU:mbuvQ2opPhnDF6YYiqVmj6vU

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6197320982:AAHJnu2nvbCAkbUWsL4Ucpaxjif4UB6T9NA/

Targets

    • Target

      DHL Original Document.exe

    • Size

      579KB

    • MD5

      7ce5957d016bc558a8aa30c3f28e30d4

    • SHA1

      16be243943b88ddb768298f2370f583dcffc2211

    • SHA256

      efa6869eaa796429cbd684b030cb6873262f6009997fe6f4c20ebd69b4ad54b6

    • SHA512

      c8178c07a5222bbcd7076a33d91f36dc7fc310a140f775909e7ffe7caab185493409d375d2099a73737a4e091efa1a141af4bde2a7aceaba5d7122037d5533f4

    • SSDEEP

      12288:9AbaXvQ2opbrGunDF6S9Dp9g2okqVvujHW7vU:mbuvQ2opPhnDF6YYiqVmj6vU

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • UAC bypass

    • Windows security bypass

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Windows security modification

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks