General
-
Target
Kulbrintens.bat
-
Size
800KB
-
Sample
230526-j2xdkaee75
-
MD5
705bf7e1d7de9cef11f0e2602ed07aaa
-
SHA1
edd8565764e87a114fa683456c7285afcd500827
-
SHA256
7c65a78541ae61a1cb4415509a3e9c7a3a0d4dcf7200d9ec89536f37fd6b540c
-
SHA512
c03bc38fba3c1726764c56fc75fd04406b68ce833e7e19c80c4dc69433fc61ca2a4fe6c27d59147e0e6829299bf2be8d7c96387c9488a5ec609faab55c9c973d
-
SSDEEP
12288:9PKcWfPW1nUOMafEa841G5ZYKstRDZr+SN3xBG+:FWonUZafEc1G5ZYKsjFr+m
Static task
static1
Behavioral task
behavioral1
Sample
Kulbrintens.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Kulbrintens.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.otj.pt - Port:
587 - Username:
[email protected] - Password:
zrevuafs1kd4 - Email To:
[email protected]
Targets
-
-
Target
Kulbrintens.bat
-
Size
800KB
-
MD5
705bf7e1d7de9cef11f0e2602ed07aaa
-
SHA1
edd8565764e87a114fa683456c7285afcd500827
-
SHA256
7c65a78541ae61a1cb4415509a3e9c7a3a0d4dcf7200d9ec89536f37fd6b540c
-
SHA512
c03bc38fba3c1726764c56fc75fd04406b68ce833e7e19c80c4dc69433fc61ca2a4fe6c27d59147e0e6829299bf2be8d7c96387c9488a5ec609faab55c9c973d
-
SSDEEP
12288:9PKcWfPW1nUOMafEa841G5ZYKstRDZr+SN3xBG+:FWonUZafEc1G5ZYKsjFr+m
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks QEMU agent file
Checks presence of QEMU agent, possibly to detect virtualization.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-