General

  • Target

    bc8f7302b6d35c63bf03679d63fc6ac9b9e27200c47ea1bc1dee65cb830bcbab

  • Size

    895KB

  • Sample

    240328-bpvp7sce5w

  • MD5

    2632c9e84c4b67cbfc837c06bca6a02b

  • SHA1

    a19e2e828bed5d46817c7f824874bce23f3b36e5

  • SHA256

    bc8f7302b6d35c63bf03679d63fc6ac9b9e27200c47ea1bc1dee65cb830bcbab

  • SHA512

    a75ddd64085b431cc9b577e24feb8b98697d562fd1f931adab708cda2b692ca17f0c1f33010936b698403978341f689f9c9a623f0f257cb57601905ccff5e1ab

  • SSDEEP

    24576:v1yTFLZOBvwJ4FDmJY491GzbyQwg4LnVmY6NnfCC2PU:v16O6J40JB91GzGJeNfCC2PU

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.medicalhome.com.pe
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    MHinfo01

Targets

    • Target

      bc8f7302b6d35c63bf03679d63fc6ac9b9e27200c47ea1bc1dee65cb830bcbab

    • Size

      895KB

    • MD5

      2632c9e84c4b67cbfc837c06bca6a02b

    • SHA1

      a19e2e828bed5d46817c7f824874bce23f3b36e5

    • SHA256

      bc8f7302b6d35c63bf03679d63fc6ac9b9e27200c47ea1bc1dee65cb830bcbab

    • SHA512

      a75ddd64085b431cc9b577e24feb8b98697d562fd1f931adab708cda2b692ca17f0c1f33010936b698403978341f689f9c9a623f0f257cb57601905ccff5e1ab

    • SSDEEP

      24576:v1yTFLZOBvwJ4FDmJY491GzbyQwg4LnVmY6NnfCC2PU:v16O6J40JB91GzGJeNfCC2PU

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • UAC bypass

    • Windows security bypass

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

3
T1562

Disable or Modify Tools

3
T1562.001

Modify Registry

5
T1112

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

6
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

5
T1082

Peripheral Device Discovery

1
T1120

Tasks