General

  • Target

    c077a80b84a9a7957cd634590a6592e1d147d8cc117f3217de85156a7b51de0a.vbs

  • Size

    39KB

  • Sample

    240328-c2x7jaba22

  • MD5

    bb5aac6e774452e8c2c1326398ab7d30

  • SHA1

    bc58b34f069a19c31f241dac4161686b244c9e67

  • SHA256

    c077a80b84a9a7957cd634590a6592e1d147d8cc117f3217de85156a7b51de0a

  • SHA512

    617476c775c40a94c34fad1cdea9f4eae1efa5fb5bb35d5e1a1460c817a6a7bf2bc10d78e5c69df26bb0b18b5d5c9314e315e9c609491b54631f50f8a33e9055

  • SSDEEP

    384:u01gBhZUIWz0AujGKoCJmMuttrW6ku83V3aiHw+tnXPR0q9hWPZyTHO8xfmux1C+:u01gBhXWAZGc8NnKwiQMnCG89KfRei

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.tecniseal.es
  • Port:
    587
  • Username:
    esther.lopez@tecniseal.es
  • Password:
    12348*tecniseal
  • Email To:
    officialspace6@gmail.com

Targets

    • Target

      c077a80b84a9a7957cd634590a6592e1d147d8cc117f3217de85156a7b51de0a.vbs

    • Size

      39KB

    • MD5

      bb5aac6e774452e8c2c1326398ab7d30

    • SHA1

      bc58b34f069a19c31f241dac4161686b244c9e67

    • SHA256

      c077a80b84a9a7957cd634590a6592e1d147d8cc117f3217de85156a7b51de0a

    • SHA512

      617476c775c40a94c34fad1cdea9f4eae1efa5fb5bb35d5e1a1460c817a6a7bf2bc10d78e5c69df26bb0b18b5d5c9314e315e9c609491b54631f50f8a33e9055

    • SSDEEP

      384:u01gBhZUIWz0AujGKoCJmMuttrW6ku83V3aiHw+tnXPR0q9hWPZyTHO8xfmux1C+:u01gBhXWAZGc8NnKwiQMnCG89KfRei

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks