General
-
Target
KNX.exe
-
Size
1.7MB
-
Sample
240727-y3xhaayhqf
-
MD5
2842e47311b96d8b87a2898c7ec55f0a
-
SHA1
9c0bca94fb062fe437680b1a7d8f86c7558b25d9
-
SHA256
f8aba5d136b8edf52385e9bb5efd03f4ac6e99f6ae3d5574b9b88cee35ec19e3
-
SHA512
d0e729294d73427bbec6c2fea81209bed173783d7ca66f12220761e0546b87f87a7b27b4981532b4665113c41d5a054a413e9ad3224c00467bd7b17070c0d72d
-
SSDEEP
49152:+n4H5eOWqlo8ugf58GHD5BR6oS4vtxxT08+6hvvb/7gxMQkN:+n4HkOWoduZID5Cx4vycveJkN
Static task
static1
Behavioral task
behavioral1
Sample
KNX.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
KNX.exe
-
Size
1.7MB
-
MD5
2842e47311b96d8b87a2898c7ec55f0a
-
SHA1
9c0bca94fb062fe437680b1a7d8f86c7558b25d9
-
SHA256
f8aba5d136b8edf52385e9bb5efd03f4ac6e99f6ae3d5574b9b88cee35ec19e3
-
SHA512
d0e729294d73427bbec6c2fea81209bed173783d7ca66f12220761e0546b87f87a7b27b4981532b4665113c41d5a054a413e9ad3224c00467bd7b17070c0d72d
-
SSDEEP
49152:+n4H5eOWqlo8ugf58GHD5BR6oS4vtxxT08+6hvvb/7gxMQkN:+n4HkOWoduZID5Cx4vycveJkN
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Legitimate hosting services abused for malware hosting/C2
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2