General

  • Target

    Ramsay.exe

  • Size

    641KB

  • Sample

    230529-prryzscc9w

  • MD5

    1548cfef1962af9a18e0751f21324e6a

  • SHA1

    3a59143105bdd6bfe0cfdc918bf58dec8bf4ca07

  • SHA256

    50803eb43c6bd5d0f4f631169f2fad176e97e57aa1ffee306d7cb64a7479f7bd

  • SHA512

    166b532242910edcda131518d878c7b4c5e96f6e38a982f821a20b5621fda1a3bb58863629ba17216572224535187781613a07d22f0de09f97aad3e153f77bd3

  • SSDEEP

    12288:Uoqqqqqqqqqqqqqqqqqqqqq0qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqN:U12KKD3UywPegHB1

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Ramsay.exe

    • Size

      641KB

    • MD5

      1548cfef1962af9a18e0751f21324e6a

    • SHA1

      3a59143105bdd6bfe0cfdc918bf58dec8bf4ca07

    • SHA256

      50803eb43c6bd5d0f4f631169f2fad176e97e57aa1ffee306d7cb64a7479f7bd

    • SHA512

      166b532242910edcda131518d878c7b4c5e96f6e38a982f821a20b5621fda1a3bb58863629ba17216572224535187781613a07d22f0de09f97aad3e153f77bd3

    • SSDEEP

      12288:Uoqqqqqqqqqqqqqqqqqqqqq0qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqN:U12KKD3UywPegHB1

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks