General
-
Target
Skou+Multi-Loader.exe
-
Size
5.4MB
-
Sample
240908-dhgk4steng
-
MD5
5a12c9a8274bdca0b49661ca8a2d031f
-
SHA1
5433c508da3f3740792dab061228cfb1318d151c
-
SHA256
438f733d858508c39ae81b7238a7c98232dabc6d389b24e4471c4a16546428a5
-
SHA512
8d14a9b8e583f69cc82d04dba24bb4a3ecf0253f741cf6c3efb5c7ba5932ee160e2f3a87f43b44b1a6ff3eaac03d454703b3391ab8de294a2bc7fed203643469
-
SSDEEP
98304:+RHOvLqx0/O4d1f3Z53AlKAdvD7WANTprOhfEQw2uQzjU411IGUmz4k/nqoIX8NV:qHWLo2OcJr3YhdvxNTpqhMMjIGzkk/nr
Malware Config
Targets
-
-
Target
Skou+Multi-Loader.exe
-
Size
5.4MB
-
MD5
5a12c9a8274bdca0b49661ca8a2d031f
-
SHA1
5433c508da3f3740792dab061228cfb1318d151c
-
SHA256
438f733d858508c39ae81b7238a7c98232dabc6d389b24e4471c4a16546428a5
-
SHA512
8d14a9b8e583f69cc82d04dba24bb4a3ecf0253f741cf6c3efb5c7ba5932ee160e2f3a87f43b44b1a6ff3eaac03d454703b3391ab8de294a2bc7fed203643469
-
SSDEEP
98304:+RHOvLqx0/O4d1f3Z53AlKAdvD7WANTprOhfEQw2uQzjU411IGUmz4k/nqoIX8NV:qHWLo2OcJr3YhdvxNTpqhMMjIGzkk/nr
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-