Overview
overview
10Static
static
10Velocity 713.7z
windows7-x64
3Velocity 713.7z
windows10-2004-x64
3Velocity 7...I2.dll
windows7-x64
1Velocity 7...I2.dll
windows10-2004-x64
1Velocity 7...er.exe
windows7-x64
10Velocity 7...er.exe
windows10-2004-x64
10Velocity 713/key.txt
windows7-x64
1Velocity 713/key.txt
windows10-2004-x64
1Velocity 7...er.exe
windows7-x64
10Velocity 7...er.exe
windows10-2004-x64
10General
-
Target
Velocity 713.7z
-
Size
38.9MB
-
Sample
240720-bjhtfstakd
-
MD5
600db85d0896bd4ca64d3e1cf28d0d6c
-
SHA1
53b07fda993398ff39b15ad9f9af9e0a72d116d6
-
SHA256
fcd4d4b1141a138caa8ff7d192b533b45dd421f0a72ca1d2779ad27e5548ff5b
-
SHA512
60ef4034e55e3ef47d597fc81bf6c259b68c7ca086c14f24d2fcd783540245bd050b737e4c7ae6e8ef75b96d22bba91d528990e3449c5de87ee97b18d5f1c67c
-
SSDEEP
786432:1aGIgd3ChvuFQaaMHvNn2lMCKaLO1TVEQYoa4afxFqlQS8SdU9ztNOb4nBW:tSFQ7aMPNnUDhO1T1pcvOQSPiObl
Behavioral task
behavioral1
Sample
Velocity 713.7z
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Velocity 713.7z
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Velocity 713/Guna.UI2.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Velocity 713/Guna.UI2.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Velocity 713/Velocity Spoofer.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
Velocity 713/Velocity Spoofer.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Velocity 713/key.txt
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Velocity 713/key.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Velocity 713/velocity spoofer.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
Velocity 713.7z
-
Size
38.9MB
-
MD5
600db85d0896bd4ca64d3e1cf28d0d6c
-
SHA1
53b07fda993398ff39b15ad9f9af9e0a72d116d6
-
SHA256
fcd4d4b1141a138caa8ff7d192b533b45dd421f0a72ca1d2779ad27e5548ff5b
-
SHA512
60ef4034e55e3ef47d597fc81bf6c259b68c7ca086c14f24d2fcd783540245bd050b737e4c7ae6e8ef75b96d22bba91d528990e3449c5de87ee97b18d5f1c67c
-
SSDEEP
786432:1aGIgd3ChvuFQaaMHvNn2lMCKaLO1TVEQYoa4afxFqlQS8SdU9ztNOb4nBW:tSFQ7aMPNnUDhO1T1pcvOQSPiObl
Score3/10 -
-
-
Target
Velocity 713/Guna.UI2.dll
-
Size
2.1MB
-
MD5
c97f23b52087cfa97985f784ea83498f
-
SHA1
d364618bec9cd6f8f5d4c24d3cc0f4c1a8e06b89
-
SHA256
e658e8a5616245dbe655e194b59f1bb704aaeafbd0925d6eebbe70555a638cdd
-
SHA512
ecfa83596f99afde9758d1142ff8b510a090cba6f42ba6fda8ca5e0520b658943ad85829a07bf17411e26e58432b74f05356f7eaeb3949a8834faa5de1a4f512
-
SSDEEP
49152:cvrqKk8q2gqi2OXCt6kuSw9g8PTNTN/23uxjPHEiCAjFcm:cvrqZr
Score1/10 -
-
-
Target
Velocity 713/Velocity Spoofer.exe
-
Size
19.7MB
-
MD5
6cb66ac3e7d224dcf60fce2902f50d4b
-
SHA1
2bf70cf93d9d6ac13916c2affb610f2c6a885764
-
SHA256
dd2f3d7118883fd2d37095ff4abf738f99a23e801935671a56a85594aa6ceb04
-
SHA512
1ad4eb84196ff724f715b7338e08c1591fdcb28ddf0786e42cf02fcdcab05cd941e3b0bf43f39705f865ddf77dd9a2c82625441008fb5cd7b890b2bc94f73b39
-
SSDEEP
393216:l4qMf3RuoaX5L7nFv2TGIlkeBqkRbfxL9tMtbmE/WUnwbZSDUX:lPMvRU1rl+GxeBqkltMtV/WUnwbZ1
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Modifies visiblity of hidden/system files in Explorer
-
AgentTesla payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
Velocity 713/key.txt
-
Size
43B
-
MD5
c7fe987ea952b2a3621c2a124df607e1
-
SHA1
27b33c13397e1a7a32e796414089c7d84e588ca3
-
SHA256
f2ea53349745adf75b983c7d1e9c5b43b8d03160ed14eb592f7579eb5d07d237
-
SHA512
a8b64001726db10e6ad6c40e7d2b2d0755bae6e0c1ea288fe7779b2faee50f23ec25bd01d7d22095b476c690b9d4f83320ac2b45a31e119e27334d1c7c12064a
Score1/10 -
-
-
Target
Velocity 713/velocity spoofer.exe
-
Size
19.6MB
-
MD5
0043cb93d8ff5d31698fc8682905ed21
-
SHA1
91579a84f56c6850e9e996508f86cccccbca6744
-
SHA256
e1b9f69a162f2d05059269bc8da64c6f1d1f799e8da5010545b2f490f6a370b4
-
SHA512
d61683d0d72403e6d88b8e678c2b3834790611a587a4b7f043d0ddec9619c03aa9293afd16f71a442133ccb793fa0fe5975066a1f0817d19b835683b472a9471
-
SSDEEP
393216:u4qMf3RuoaX5L7nFv2TGIlkeBqkRbfxL9tMtbmE/WUnwbZSDU:uPMvRU1rl+GxeBqkltMtV/WUnwbZ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1