General

  • Target

    Loader.exe

  • Size

    7.2MB

  • Sample

    240726-r9sdksyalb

  • MD5

    36bf24717a8bb6d09ad89cf726aceb32

  • SHA1

    df98d0381952971a6b1c025fa79d63b9de269fd9

  • SHA256

    d46ee1b6cb535f10569f32fd2cacd45e57604618acf9c9325b1a42c08a58501d

  • SHA512

    2d88e7125e62455091bce76867bd8e9118a0bf46ad70b62061e51da631dbdf5ecbe0069258dd36205d5961db0483b0a68287af89a40da9387ca256542fda6adb

  • SSDEEP

    196608:aCkDGLYW9iMuxHUF7WhQ+5GvyEUNNwjsJiTVwjkOi0:Bkip6hQ+UvwJimp

Malware Config

Targets

    • Target

      Loader.exe

    • Size

      7.2MB

    • MD5

      36bf24717a8bb6d09ad89cf726aceb32

    • SHA1

      df98d0381952971a6b1c025fa79d63b9de269fd9

    • SHA256

      d46ee1b6cb535f10569f32fd2cacd45e57604618acf9c9325b1a42c08a58501d

    • SHA512

      2d88e7125e62455091bce76867bd8e9118a0bf46ad70b62061e51da631dbdf5ecbe0069258dd36205d5961db0483b0a68287af89a40da9387ca256542fda6adb

    • SSDEEP

      196608:aCkDGLYW9iMuxHUF7WhQ+5GvyEUNNwjsJiTVwjkOi0:Bkip6hQ+UvwJimp

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks