General

  • Target

    0b8154e3905fe82a62732791895e0510c240067b97f5ddf4edee2b10f2e984ad.vbs

  • Size

    37KB

  • Sample

    240328-cf6a1sch3w

  • MD5

    80c96ad14b599fbc36f688a6dbc2efb8

  • SHA1

    031ceb90f111733e78a69f883d0d8465db7712d1

  • SHA256

    0b8154e3905fe82a62732791895e0510c240067b97f5ddf4edee2b10f2e984ad

  • SHA512

    47d1b5a2046a7729717f22c0b2dfda92bbea8360570df3d19c2882955a0ec312d2aa46cc6d2ef6620979bf97d1ce67484870c77994fd835007f273cbcc4cb5a5

  • SSDEEP

    768:u00gBRvWAZGc8NnKwiQm96aPESr2bBiort:X1qNnKwfZSibBi6

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.ispartamensucat.com.tr
  • Port:
    587
  • Username:
    impex@ispartamensucat.com.tr
  • Password:
    Qaz!'2020,

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.ispartamensucat.com.tr
  • Port:
    587
  • Username:
    impex@ispartamensucat.com.tr
  • Password:
    Qaz!'2020,
  • Email To:
    nonewthing9@gmail.com

Targets

    • Target

      0b8154e3905fe82a62732791895e0510c240067b97f5ddf4edee2b10f2e984ad.vbs

    • Size

      37KB

    • MD5

      80c96ad14b599fbc36f688a6dbc2efb8

    • SHA1

      031ceb90f111733e78a69f883d0d8465db7712d1

    • SHA256

      0b8154e3905fe82a62732791895e0510c240067b97f5ddf4edee2b10f2e984ad

    • SHA512

      47d1b5a2046a7729717f22c0b2dfda92bbea8360570df3d19c2882955a0ec312d2aa46cc6d2ef6620979bf97d1ce67484870c77994fd835007f273cbcc4cb5a5

    • SSDEEP

      768:u00gBRvWAZGc8NnKwiQm96aPESr2bBiort:X1qNnKwfZSibBi6

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks