General

  • Target

    bf67292051e20b9e56d15ab6aa97e020N

  • Size

    1.8MB

  • Sample

    240912-xtvfwszbjk

  • MD5

    bf67292051e20b9e56d15ab6aa97e020

  • SHA1

    fde26bd0c2f5a2949576671353ec83ba4d2ebf19

  • SHA256

    28a1a3e5507582ca381e9a311ad857b3fa4538602da36d5307f050677387840b

  • SHA512

    46dc21da298c65afc540b421fae70aa01e7d695360fe04d4388a5183fe8a75c15b46b2a857eab15c68939b457b9f2a3d4e87a9adae59755f8bb114430c129785

  • SSDEEP

    49152:6yi6csvMJ+vbJCDF0CcB96kEG1ghVOuWBrmuBAt/3oDcLa:z7vjJzAqyuBAZ32cm

Malware Config

Targets

    • Target

      bf67292051e20b9e56d15ab6aa97e020N

    • Size

      1.8MB

    • MD5

      bf67292051e20b9e56d15ab6aa97e020

    • SHA1

      fde26bd0c2f5a2949576671353ec83ba4d2ebf19

    • SHA256

      28a1a3e5507582ca381e9a311ad857b3fa4538602da36d5307f050677387840b

    • SHA512

      46dc21da298c65afc540b421fae70aa01e7d695360fe04d4388a5183fe8a75c15b46b2a857eab15c68939b457b9f2a3d4e87a9adae59755f8bb114430c129785

    • SSDEEP

      49152:6yi6csvMJ+vbJCDF0CcB96kEG1ghVOuWBrmuBAt/3oDcLa:z7vjJzAqyuBAZ32cm

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks