Resubmissions

15-05-2023 11:15

230515-nc1rxaad5w 10

15-05-2023 09:17

230515-k9jm4saa21 10

15-05-2023 09:14

230515-k7vbtsfe86 3

General

  • Target

    da9e335cd673f6fe0bba1fa82aa04e4c.zip

  • Size

    137KB

  • Sample

    230515-nc1rxaad5w

  • MD5

    261c02daf824cc91dfcc3cfbec2000f7

  • SHA1

    f7b912f3115929948f1493ea136154f4a93e3075

  • SHA256

    937f43ce0b39fca4de06bbeaa5aac7f4ff41397d24aff49ca1441534c7ad05db

  • SHA512

    2fa58619abe99ed422de6d415c2455edf1aea266a57adf0d4fc0f8b3c1d1237c024403cac52cf2336890f3bb84f78b3f788425178f7356e2d62200ceb0038814

  • SSDEEP

    3072:qjDGp7dXsl+oN7upch8mRKuOqsseTyRIFC4vIB3hadIiMZETB:q3G/Xsl+oN7MY8m4hj+8Cp9AdPMZEt

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      MY00046R0239528MYKUL.exe

    • Size

      154KB

    • MD5

      da9e335cd673f6fe0bba1fa82aa04e4c

    • SHA1

      fdb8e13542a61d2e186e9b4b1cf1573868a80121

    • SHA256

      b2280e958e4020f76a0096cff05b795311599a6e36bdc9f3131e66bcfd27fa5a

    • SHA512

      e52fc95374f9b2ba1eeeac2ed82a406ada102db7fa7b388e2a18391c9a6c2fdb869dbf3f4eaa3fe3e84c0551721565da3174c85873a0be779a2acd36acdf4770

    • SSDEEP

      3072:cYu/YbAcxltXuX4bBGCOVy04vEfS7ylxJdEOA1Uz04/GlqwTNqjnN+5:c6bAcJZxC4vvGDtA6Yfg4NqjnNQ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks