General

  • Target

    D4RKWARE+WOOFER+1.3V.exe

  • Size

    2.5MB

  • Sample

    240903-krbjsatcrf

  • MD5

    e3ecfc13d055ae4712e5d740b4f2e55e

  • SHA1

    119c0ef88b550ca8ff59210e2620fc9c5e00862b

  • SHA256

    477dce069519b9a063105e3a15de8094eaf788c9e7af71aa8966f25650db91ec

  • SHA512

    26e19176fba4ad57b4981c8e5b5cdd16f6cbb2843c59849c8eb8cefde1c621d1c3204c99b9008b889476beda0a2f993999000cc71a9bbf3b2ee8123acef8a3d8

  • SSDEEP

    49152:9A9nAO3L5HHabE3pJOd2yEVJeMVT4fToqjipTReh2nLj8EW9TJqj+z:9RCL5HHao3e29QCd+aj+z

Malware Config

Targets

    • Target

      D4RKWARE+WOOFER+1.3V.exe

    • Size

      2.5MB

    • MD5

      e3ecfc13d055ae4712e5d740b4f2e55e

    • SHA1

      119c0ef88b550ca8ff59210e2620fc9c5e00862b

    • SHA256

      477dce069519b9a063105e3a15de8094eaf788c9e7af71aa8966f25650db91ec

    • SHA512

      26e19176fba4ad57b4981c8e5b5cdd16f6cbb2843c59849c8eb8cefde1c621d1c3204c99b9008b889476beda0a2f993999000cc71a9bbf3b2ee8123acef8a3d8

    • SSDEEP

      49152:9A9nAO3L5HHabE3pJOd2yEVJeMVT4fToqjipTReh2nLj8EW9TJqj+z:9RCL5HHao3e29QCd+aj+z

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Legitimate hosting services abused for malware hosting/C2

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks