General

  • Target

    8b7c5d53812ea0abfc73d680313417506ce8cdf6476604829f74e1c62775dac4.vbs

  • Size

    37KB

  • Sample

    240329-cxymhafd2z

  • MD5

    f502e10ed6fe68f3ae7ab8dc21d85905

  • SHA1

    c5f150a8ad65c02818b317202bc0b4c885d681a6

  • SHA256

    8b7c5d53812ea0abfc73d680313417506ce8cdf6476604829f74e1c62775dac4

  • SHA512

    e676b0c0974339cebbe6f4e0ce4e0a33aefde01588af7cc20c7ae6be11b8467da271a7496c8e37245ff7c523dbabbf3de3d9831318127b9dbc98987d84a4930e

  • SSDEEP

    768:u0agBVh4WAZGc8NnKwiQRP1Ugmj8VeuwRwHv8:hwqNnKwJDLVmRP

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.z2neumec.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Gid@2021

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      8b7c5d53812ea0abfc73d680313417506ce8cdf6476604829f74e1c62775dac4.vbs

    • Size

      37KB

    • MD5

      f502e10ed6fe68f3ae7ab8dc21d85905

    • SHA1

      c5f150a8ad65c02818b317202bc0b4c885d681a6

    • SHA256

      8b7c5d53812ea0abfc73d680313417506ce8cdf6476604829f74e1c62775dac4

    • SHA512

      e676b0c0974339cebbe6f4e0ce4e0a33aefde01588af7cc20c7ae6be11b8467da271a7496c8e37245ff7c523dbabbf3de3d9831318127b9dbc98987d84a4930e

    • SSDEEP

      768:u0agBVh4WAZGc8NnKwiQRP1Ugmj8VeuwRwHv8:hwqNnKwJDLVmRP

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks