General
-
Target
Loader.exe
-
Size
7.2MB
-
Sample
240726-r9sdksyalb
-
MD5
36bf24717a8bb6d09ad89cf726aceb32
-
SHA1
df98d0381952971a6b1c025fa79d63b9de269fd9
-
SHA256
d46ee1b6cb535f10569f32fd2cacd45e57604618acf9c9325b1a42c08a58501d
-
SHA512
2d88e7125e62455091bce76867bd8e9118a0bf46ad70b62061e51da631dbdf5ecbe0069258dd36205d5961db0483b0a68287af89a40da9387ca256542fda6adb
-
SSDEEP
196608:aCkDGLYW9iMuxHUF7WhQ+5GvyEUNNwjsJiTVwjkOi0:Bkip6hQ+UvwJimp
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20240705-en
Malware Config
Targets
-
-
Target
Loader.exe
-
Size
7.2MB
-
MD5
36bf24717a8bb6d09ad89cf726aceb32
-
SHA1
df98d0381952971a6b1c025fa79d63b9de269fd9
-
SHA256
d46ee1b6cb535f10569f32fd2cacd45e57604618acf9c9325b1a42c08a58501d
-
SHA512
2d88e7125e62455091bce76867bd8e9118a0bf46ad70b62061e51da631dbdf5ecbe0069258dd36205d5961db0483b0a68287af89a40da9387ca256542fda6adb
-
SSDEEP
196608:aCkDGLYW9iMuxHUF7WhQ+5GvyEUNNwjsJiTVwjkOi0:Bkip6hQ+UvwJimp
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1