General

  • Target

    HFQ098654567808.exe

  • Size

    560KB

  • Sample

    231103-kq1ghsha29

  • MD5

    35b36d0ea52a8a62c6f029b3f0bf0935

  • SHA1

    7c277fef0d5d26676662943368cdf4de5758d439

  • SHA256

    da75778d7ebfe9d20f3f4e0d39691afbbf0aab526d509dae99010c92381c042a

  • SHA512

    6be6ad9580ada3faa5c7f32f29e60338fc0696567223aba05f862881022ce23bcd22a6d4debe543dead6be7bd590fcd73a692aa3719ef2c99cfbcde7991eb6da

  • SSDEEP

    12288:koWA468sXQx8+92WM+RtCurnVf99v8haK4+:z3useZ9RtVrV918T

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.daipro.com.mx
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Daipro123*%

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      HFQ098654567808.exe

    • Size

      560KB

    • MD5

      35b36d0ea52a8a62c6f029b3f0bf0935

    • SHA1

      7c277fef0d5d26676662943368cdf4de5758d439

    • SHA256

      da75778d7ebfe9d20f3f4e0d39691afbbf0aab526d509dae99010c92381c042a

    • SHA512

      6be6ad9580ada3faa5c7f32f29e60338fc0696567223aba05f862881022ce23bcd22a6d4debe543dead6be7bd590fcd73a692aa3719ef2c99cfbcde7991eb6da

    • SSDEEP

      12288:koWA468sXQx8+92WM+RtCurnVf99v8haK4+:z3useZ9RtVrV918T

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • UAC bypass

    • Windows security bypass

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks