General

  • Target

    REXObfuscator.exe

  • Size

    4.9MB

  • Sample

    240430-a4qt5afb76

  • MD5

    c80af0de7960d66227c20901ad220feb

  • SHA1

    83fe8468210035bbb2c24b50645a11e62fb377bd

  • SHA256

    a0dee72c5357c474929e083d2205d18b00fedb479ba4fba32fffc91c3d32c6b9

  • SHA512

    f34e1a276cd3db5676e5d6ef92343f1d456c72e93024cf9bde817bf6a3ae0aa9f903123b3796862fa28e1e8cbcf1271bb77f96ac4f699a79ddab1134fb924f13

  • SSDEEP

    98304:Fz/2M3gz6lUcoD83VAZGtqEnQcvytg1ucK3t:V/2M3/lfXlAZXEnQcaeucK3t

Malware Config

Targets

    • Target

      REXObfuscator.exe

    • Size

      4.9MB

    • MD5

      c80af0de7960d66227c20901ad220feb

    • SHA1

      83fe8468210035bbb2c24b50645a11e62fb377bd

    • SHA256

      a0dee72c5357c474929e083d2205d18b00fedb479ba4fba32fffc91c3d32c6b9

    • SHA512

      f34e1a276cd3db5676e5d6ef92343f1d456c72e93024cf9bde817bf6a3ae0aa9f903123b3796862fa28e1e8cbcf1271bb77f96ac4f699a79ddab1134fb924f13

    • SSDEEP

      98304:Fz/2M3gz6lUcoD83VAZGtqEnQcvytg1ucK3t:V/2M3/lfXlAZXEnQcaeucK3t

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Legitimate hosting services abused for malware hosting/C2

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Command and Control

Web Service

1
T1102

Tasks