Resubmissions
24-10-2024 21:03
241024-zv5dlathjf 1General
-
Target
RNSM00439.7z
-
Size
106.7MB
-
Sample
241025-wez76azngv
-
MD5
63c3e9eaea5a68b2e6eb2cbe628ebbae
-
SHA1
00e621930a325dbf2af253f92199e720697da9c1
-
SHA256
3446df3ed44fb3b1c5d9da71fbb19c82b44105827aaaab34f68bc30df01a936c
-
SHA512
73e2d4f0393defc504ec8dc20f3c7b5d4e0452d195d42aa5442ba8c88b5b6681a19c6027c6817dc5df32e9548bf4b38e63cd0155094dd41d7e5457ed3b6383a9
-
SSDEEP
3145728:CTYNxP7DTS3kYmW5WiFT81N7bhgRiDqX5tv8qDu:cYNd7DTjYz5W6T81N71g+U1R6
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00439.7z
Resource
win10v2004-20241007-en
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Extracted
nanocore
1.2.2.0
dbep.duckdns.org:54920
warqazx.strangled.net:54920
2d2dca86-7818-426c-9e84-55f634ea61fc
-
activate_away_mode
true
-
backup_connection_host
warqazx.strangled.net
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2021-03-07T16:37:38.065258936Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
54920
-
default_group
26thmay
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
2d2dca86-7818-426c-9e84-55f634ea61fc
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
dbep.duckdns.org
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
computer.com
Extracted
bitrat
1.35
wdupdate.duckdns.org:4455
-
communication_password
bfe6c14c945256de12a6add92c83b4d9
-
tor_process
tor
Targets
-
-
Target
RNSM00439.7z
-
Size
106.7MB
-
MD5
63c3e9eaea5a68b2e6eb2cbe628ebbae
-
SHA1
00e621930a325dbf2af253f92199e720697da9c1
-
SHA256
3446df3ed44fb3b1c5d9da71fbb19c82b44105827aaaab34f68bc30df01a936c
-
SHA512
73e2d4f0393defc504ec8dc20f3c7b5d4e0452d195d42aa5442ba8c88b5b6681a19c6027c6817dc5df32e9548bf4b38e63cd0155094dd41d7e5457ed3b6383a9
-
SSDEEP
3145728:CTYNxP7DTS3kYmW5WiFT81N7bhgRiDqX5tv8qDu:cYNd7DTjYz5W6T81N71g+U1R6
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Asyncrat family
-
Bitrat family
-
Detect ZGRat V2
-
Nanocore family
-
Tofsee family
-
Xmrig family
-
Zgrat family
-
AgentTesla payload
-
Renames multiple (121) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
XMRig Miner payload
-
Creates new service(s)
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Modifies Windows Firewall
-
Sets service image path in registry
-
System Binary Proxy Execution: InstallUtil
Abuse InstallUtil to proxy execution of malicious code.
-
System Binary Proxy Execution: Regsvcs/Regasm
Abuse Regasm to proxy execution of malicious code.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Subvert Trust Controls
1SIP and Trust Provider Hijacking
1System Binary Proxy Execution
2InstallUtil
1Regsvcs/Regasm
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1