General

  • Target

    Kulbrintens.bat

  • Size

    800KB

  • Sample

    230526-j2xdkaee75

  • MD5

    705bf7e1d7de9cef11f0e2602ed07aaa

  • SHA1

    edd8565764e87a114fa683456c7285afcd500827

  • SHA256

    7c65a78541ae61a1cb4415509a3e9c7a3a0d4dcf7200d9ec89536f37fd6b540c

  • SHA512

    c03bc38fba3c1726764c56fc75fd04406b68ce833e7e19c80c4dc69433fc61ca2a4fe6c27d59147e0e6829299bf2be8d7c96387c9488a5ec609faab55c9c973d

  • SSDEEP

    12288:9PKcWfPW1nUOMafEa841G5ZYKstRDZr+SN3xBG+:FWonUZafEc1G5ZYKsjFr+m

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Kulbrintens.bat

    • Size

      800KB

    • MD5

      705bf7e1d7de9cef11f0e2602ed07aaa

    • SHA1

      edd8565764e87a114fa683456c7285afcd500827

    • SHA256

      7c65a78541ae61a1cb4415509a3e9c7a3a0d4dcf7200d9ec89536f37fd6b540c

    • SHA512

      c03bc38fba3c1726764c56fc75fd04406b68ce833e7e19c80c4dc69433fc61ca2a4fe6c27d59147e0e6829299bf2be8d7c96387c9488a5ec609faab55c9c973d

    • SSDEEP

      12288:9PKcWfPW1nUOMafEa841G5ZYKstRDZr+SN3xBG+:FWonUZafEc1G5ZYKsjFr+m

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks