General

  • Target

    977965787ace76ed2ef7b9d8923958c46ceaefa46ec09ad2436f4b22b1b42513.vbs

  • Size

    37KB

  • Sample

    240328-cyf4vaah34

  • MD5

    a22712d23b2775c205038a1ac865442a

  • SHA1

    131ffe41766faa1d9f7e54838f3419cd08480c1f

  • SHA256

    977965787ace76ed2ef7b9d8923958c46ceaefa46ec09ad2436f4b22b1b42513

  • SHA512

    f22828a540b59594f8f91278c41c578eb19fde3432c57ca90a0d5c756bafc87699ed547de92b4e48c5ba116b72bfec3acbcb2e31cbd66d687ebbe876024eb346

  • SSDEEP

    768:u0bgBGhARWAZGc8NnKwiQREsqf+KhjMFpd:AMAjqNnKw5UnJMFv

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      977965787ace76ed2ef7b9d8923958c46ceaefa46ec09ad2436f4b22b1b42513.vbs

    • Size

      37KB

    • MD5

      a22712d23b2775c205038a1ac865442a

    • SHA1

      131ffe41766faa1d9f7e54838f3419cd08480c1f

    • SHA256

      977965787ace76ed2ef7b9d8923958c46ceaefa46ec09ad2436f4b22b1b42513

    • SHA512

      f22828a540b59594f8f91278c41c578eb19fde3432c57ca90a0d5c756bafc87699ed547de92b4e48c5ba116b72bfec3acbcb2e31cbd66d687ebbe876024eb346

    • SSDEEP

      768:u0bgBGhARWAZGc8NnKwiQREsqf+KhjMFpd:AMAjqNnKw5UnJMFv

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks