General

  • Target

    svchost_protected.exe

  • Size

    7.6MB

  • Sample

    240830-xptnss1ckm

  • MD5

    4cfcc5d2726fae6a7d5ca823bcbc27f2

  • SHA1

    104cd989cec2e3d44a8b4558c3607bf570c32a8f

  • SHA256

    c82108c4e44fd4cf6a738fe0a9b7e0f48d7562cb9814ef9f3e6bc69baaa49d72

  • SHA512

    5331aae68b8ae6d9131d08c1fbd756c1f0e0805ae7b23956deef7111026d17e024472a6f490cc7551d3a5a0d3b09d6726b894f033388a65710a9b079aabef2e7

  • SSDEEP

    196608:yd2RtaSKkkPYelGUStVqoAENrwKW9I6hqRTJy+1OTNzLt:W2DqkkPYelGUzCtxFy+1ONLt

Malware Config

Targets

    • Target

      svchost_protected.exe

    • Size

      7.6MB

    • MD5

      4cfcc5d2726fae6a7d5ca823bcbc27f2

    • SHA1

      104cd989cec2e3d44a8b4558c3607bf570c32a8f

    • SHA256

      c82108c4e44fd4cf6a738fe0a9b7e0f48d7562cb9814ef9f3e6bc69baaa49d72

    • SHA512

      5331aae68b8ae6d9131d08c1fbd756c1f0e0805ae7b23956deef7111026d17e024472a6f490cc7551d3a5a0d3b09d6726b894f033388a65710a9b079aabef2e7

    • SSDEEP

      196608:yd2RtaSKkkPYelGUStVqoAENrwKW9I6hqRTJy+1OTNzLt:W2DqkkPYelGUzCtxFy+1ONLt

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks