General

  • Target

    3. BurgiesFreeTemp [V1].exe

  • Size

    6.4MB

  • Sample

    240902-ymmm5sxbqf

  • MD5

    4a1589604e6c667277362505b766aca6

  • SHA1

    94dea4851ef30d6b53c664980f9287709702187b

  • SHA256

    3fd1f1a5ce10e38ec3880b643b31498d378806dfefff90820f3b73fed736dbaa

  • SHA512

    9b9eb8bea26bcb796c2754e98fff4fceddc83ca74ebcb52dc99216926f76cf24526fe32ad1d337b21cf8e8aa9755a3171c44acde7c83c82eb70b9f83e0eb0781

  • SSDEEP

    196608:0/UzgnQLcf7AjVgxowXJ2vfFoImTSGw9mqEgT3U6:0/IguU7225J2Xce9mWU6

Malware Config

Targets

    • Target

      3. BurgiesFreeTemp [V1].exe

    • Size

      6.4MB

    • MD5

      4a1589604e6c667277362505b766aca6

    • SHA1

      94dea4851ef30d6b53c664980f9287709702187b

    • SHA256

      3fd1f1a5ce10e38ec3880b643b31498d378806dfefff90820f3b73fed736dbaa

    • SHA512

      9b9eb8bea26bcb796c2754e98fff4fceddc83ca74ebcb52dc99216926f76cf24526fe32ad1d337b21cf8e8aa9755a3171c44acde7c83c82eb70b9f83e0eb0781

    • SSDEEP

      196608:0/UzgnQLcf7AjVgxowXJ2vfFoImTSGw9mqEgT3U6:0/IguU7225J2Xce9mWU6

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks