General

  • Target

    https://cdn.discordapp.com/attachments/1227046637365493811/1230337232846459031/Zwle_Free_Perm.exe?ex=6632f3d6&is=66207ed6&hm=ebcfb4449a3e01114938ce36c8b3ed6465fd127124b807cb9d5aedb3af7d1d85&

  • Sample

    240421-wqjdsage64

Malware Config

Targets

    • Target

      https://cdn.discordapp.com/attachments/1227046637365493811/1230337232846459031/Zwle_Free_Perm.exe?ex=6632f3d6&is=66207ed6&hm=ebcfb4449a3e01114938ce36c8b3ed6465fd127124b807cb9d5aedb3af7d1d85&

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks