Resubmissions
07-07-2024 10:00
240707-l1l8ba1gqb 1007-07-2024 09:59
240707-l1e41a1gpc 106-07-2024 07:41
240706-jjdhqstcpg 406-07-2024 06:14
240706-gzq3na1blh 106-07-2024 06:14
240706-gzmegaybjq 405-07-2024 10:41
240705-mrjlhawhpp 405-07-2024 10:30
240705-mj4lpsyhlc 405-07-2024 10:17
240705-mble6awfnq 102-07-2024 14:21
240702-rpd1fswfjg 1008-07-2024 07:13
240708-h2an5azgkgGeneral
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
Family
xworm
C2
127.0.0.1:7000
Attributes
-
install_file
USB.exe
Targets
-
-
Target
https://github.com
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Uses the VBS compiler for execution
-