General
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1227046637365493811/1230337232846459031/Zwle_Free_Perm.exe?ex=6632f3d6&is=66207ed6&hm=ebcfb4449a3e01114938ce36c8b3ed6465fd127124b807cb9d5aedb3af7d1d85&
Resource
win11-20240412-en
Malware Config
Targets
-
-
Target
https://cdn.discordapp.com/attachments/1227046637365493811/1230337232846459031/Zwle_Free_Perm.exe?ex=6632f3d6&is=66207ed6&hm=ebcfb4449a3e01114938ce36c8b3ed6465fd127124b807cb9d5aedb3af7d1d85&
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Stops running service(s)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-