General

  • Target

    20092024_0916_New Order-Tefanujofaman Trading Co. Ltd.vbs.zip

  • Size

    23KB

  • Sample

    240920-k8vc8ayfrd

  • MD5

    16267f5dfd27763cc0a9cc39991a5edf

  • SHA1

    6da0e2f03ab37a3c72df02450f3e1fdbb108ee21

  • SHA256

    8a919f230f442afcb8b9ae6b0d5c83de4f8cfd50c5c4db3a5b1c59d287976712

  • SHA512

    0f0119e2c58a7c42b0fd24bc67eb1ee7177a392d8c25772a89ec595ca4d9cee7cd6609784b5785a179f07976c5ddda205dce89fd4a77cf1d0d13d3ad9a639a80

  • SSDEEP

    384:GypwLH+K9JNR5IOPEnS1o60mTA4GHBlR+kmhrRkv0FdFvj8PtN4KL61D5hh0Y:lwLeK9JL8neoBmTA4unRM7bvatfoPh0Y

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      New Order-Tefanujofaman Trading Co. Ltd.vbs

    • Size

      43KB

    • MD5

      0c816e41fef783ec40ce2d7447d4c5dd

    • SHA1

      e0f156439fcba011174f92ef01a4a376b337314d

    • SHA256

      b828a42d31cb9bab2620c4c1def73499c542be4f19a802c08e9c0a0971192c3f

    • SHA512

      cb93ee840b711ad21cebb8f2d1f98aee087a166c320783de4913bfa70db5118780edd00d5df7712f9473452918f05d2ebad88f23280f10f97ded355b22bab7c3

    • SSDEEP

      768:B696nNHECqC68L+iyHNm4WH8xlDeVXQ8MuCzPvbG4O8/MsOAkieqfz7DIKFAR:g9Ge8LP4xxaQhlDDpUssRWnIKFAR

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks