General

  • Target

    message(1).bat

  • Size

    4KB

  • Sample

    240916-a2c59azfrc

  • MD5

    e296801aa02e88edcfc6132fbfe05504

  • SHA1

    7bffaaebf505f46a2a5fa352076781e3b70b816b

  • SHA256

    d94d1e06068956048d32860b187a4a5faab782143631660f2d174048f6cae5ae

  • SHA512

    79e27d197a69f40b4e1478dd0020644b7378dcc4455df9f8ad03caf0ebc80e63809b486fd2df57e6978c8fee49bd7192d8b5e4d765803153741d3767c5b04d32

  • SSDEEP

    96:FKBYr6CQ9lrTi8Dsg9jfltpRBTPiQQLNBuZYbzTe/jyDaP3D7uM1I2iJPABY:FJr6CR8wgNlTaLnuqbe/yaP3mM1GPD

Malware Config

Targets

    • Target

      message(1).bat

    • Size

      4KB

    • MD5

      e296801aa02e88edcfc6132fbfe05504

    • SHA1

      7bffaaebf505f46a2a5fa352076781e3b70b816b

    • SHA256

      d94d1e06068956048d32860b187a4a5faab782143631660f2d174048f6cae5ae

    • SHA512

      79e27d197a69f40b4e1478dd0020644b7378dcc4455df9f8ad03caf0ebc80e63809b486fd2df57e6978c8fee49bd7192d8b5e4d765803153741d3767c5b04d32

    • SSDEEP

      96:FKBYr6CQ9lrTi8Dsg9jfltpRBTPiQQLNBuZYbzTe/jyDaP3D7uM1I2iJPABY:FJr6CR8wgNlTaLnuqbe/yaP3mM1GPD

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks