General

  • Target

    b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252

  • Size

    3.2MB

  • Sample

    240905-g91pvavbpl

  • MD5

    06dcb15ae610d9451fb568bc536069ee

  • SHA1

    611af21b221bd004e7546d2603793de501b4f38d

  • SHA256

    b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252

  • SHA512

    9ce44cf3089f267b8db94ae4bdb3e78655fefe0aab4125cae956f0fbef4aa161e6eaca1f3ac0b755d75e10a1e31a5231c450ac8a04fc461bd1dbf45ee92c19fb

  • SSDEEP

    49152:tJkY6l5vePmrlqqZZp/wuERzibxCfAz7x:bkY6l5vePGlp99b/x

Malware Config

Targets

    • Target

      b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252

    • Size

      3.2MB

    • MD5

      06dcb15ae610d9451fb568bc536069ee

    • SHA1

      611af21b221bd004e7546d2603793de501b4f38d

    • SHA256

      b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252

    • SHA512

      9ce44cf3089f267b8db94ae4bdb3e78655fefe0aab4125cae956f0fbef4aa161e6eaca1f3ac0b755d75e10a1e31a5231c450ac8a04fc461bd1dbf45ee92c19fb

    • SSDEEP

      49152:tJkY6l5vePmrlqqZZp/wuERzibxCfAz7x:bkY6l5vePGlp99b/x

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Modifies visiblity of hidden/system files in Explorer

    • AgentTesla payload

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks