General

  • Target

    Transferenciarecibo.exe

  • Size

    448KB

  • Sample

    230523-h3sakafb41

  • MD5

    e7b62be8090ec0dc64e35039c97173da

  • SHA1

    914f33cabb3fc5bfcdb09493bd4fc7aeef4c2637

  • SHA256

    d056da5721cc045e4416722d34e460403271865a14d0ab042a3d2224a188851a

  • SHA512

    ebb8c7b1d0d94433b29baaa2515d02829dda68dc8d36c4c0dcf069c653c1d61a3918673537825be2c6047ca5219663fd8ebf47f60be595ea8c654966c15555c7

  • SSDEEP

    6144:/hRUeCcWlHD12IhuTW/HkdHLQYJotlrvMyMp6een79Z4ivUNDwof+nT:5QcWlh5yW89Zatl7Omn5Z1vUSoc

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Transferenciarecibo.exe

    • Size

      448KB

    • MD5

      e7b62be8090ec0dc64e35039c97173da

    • SHA1

      914f33cabb3fc5bfcdb09493bd4fc7aeef4c2637

    • SHA256

      d056da5721cc045e4416722d34e460403271865a14d0ab042a3d2224a188851a

    • SHA512

      ebb8c7b1d0d94433b29baaa2515d02829dda68dc8d36c4c0dcf069c653c1d61a3918673537825be2c6047ca5219663fd8ebf47f60be595ea8c654966c15555c7

    • SSDEEP

      6144:/hRUeCcWlHD12IhuTW/HkdHLQYJotlrvMyMp6een79Z4ivUNDwof+nT:5QcWlh5yW89Zatl7Omn5Z1vUSoc

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks