General

  • Target

    dddd96d33d61b8ed958455ce58442f2225f81a5f215525f143e48220fd47ac86.vbs

  • Size

    37KB

  • Sample

    240213-gdpmpsgb4z

  • MD5

    38a7d7d9221cbbdaebc363213e712492

  • SHA1

    67aacef9422498071ed7395fdd2cd0538e2c9fee

  • SHA256

    dddd96d33d61b8ed958455ce58442f2225f81a5f215525f143e48220fd47ac86

  • SHA512

    d3a8ea582f2066be4759a753f2f22ac1d937a491218966011f87ec458c36a962062761425c0484ad79c10c13af2b983894491ef0606527e479e0c9b61c35ffef

  • SSDEEP

    768:vUJqmkNEmbCXqwCrz3kadHM3+oEWzMIHl+xAaRV0e:cJQE0b9rz/JMOoTzMIHw3r

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.petrozenergy.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Beans12!@

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      dddd96d33d61b8ed958455ce58442f2225f81a5f215525f143e48220fd47ac86.vbs

    • Size

      37KB

    • MD5

      38a7d7d9221cbbdaebc363213e712492

    • SHA1

      67aacef9422498071ed7395fdd2cd0538e2c9fee

    • SHA256

      dddd96d33d61b8ed958455ce58442f2225f81a5f215525f143e48220fd47ac86

    • SHA512

      d3a8ea582f2066be4759a753f2f22ac1d937a491218966011f87ec458c36a962062761425c0484ad79c10c13af2b983894491ef0606527e479e0c9b61c35ffef

    • SSDEEP

      768:vUJqmkNEmbCXqwCrz3kadHM3+oEWzMIHl+xAaRV0e:cJQE0b9rz/JMOoTzMIHw3r

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks