General

  • Target

    9ea5024fa900f527b2f4457340ce4f1b4c3b3eb180175c176a6e3cd5b86b7e35.rar

  • Size

    3.3MB

  • Sample

    241125-c76e4atqfx

  • MD5

    61e93ec20f6c788f968c87a480b49ce8

  • SHA1

    674227ed2c9ed3042646f822236a88dfec5b0ba9

  • SHA256

    9ea5024fa900f527b2f4457340ce4f1b4c3b3eb180175c176a6e3cd5b86b7e35

  • SHA512

    94c94b965f1e7c406efebd2bdede76220eb56d541ecaedca9f5adb5f336f2868e99d8e8f2795c8c9bb788ea463c55f47a6302ccaee236a83d7205a535034c3d9

  • SSDEEP

    98304:JsSTIuLBvZny6MF4f1sSgN8yY9qFA4FNuqhS:euLDyvFauPyEFNuWS

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot7390139954:AAFw-89dzufZnN9iQ-qMJ7xuGsXRrzvXAEI/

Targets

    • Target

      PRODUCT LIST/DESIGN LOGO.exe

    • Size

      1.7MB

    • MD5

      97042a029def0b48a06a31d39d32654f

    • SHA1

      6ddba4f407409166bb39e03ba4d9ff528d38d636

    • SHA256

      bf9d54dce88b260dbf1ce555bd7abdd98b030bb3ee2170d51272c1b0ec8605a0

    • SHA512

      72f5a89e5c6e7d880c3d3bb39efea644cf402d80c6f9b9b771c2158e4e6095ec5aab9306aab8510a8b7bf1c7609f644fc8f24220e9260e247bbcdb3f07607e50

    • SSDEEP

      49152:WA6OSh5GOieweChL9K+Dg0CoGIlcYtpGdb:WAzFh100CwG

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      PRODUCT LIST/PRODUCT LIST.exe

    • Size

      1.7MB

    • MD5

      a9b805862ccee6848ce91ef51a31f71d

    • SHA1

      4ca749b30f879945324811f5924996765aa7d2e4

    • SHA256

      9bdef064f9693bbae4a073b09a795c7b27e7486c10b3c7d920019ca3729bb434

    • SHA512

      94b6cc887127129a3b51dd68b8d29e417a70e7538668f5bfb4d5e1769d74e2ce44dcef9f36ab6021e04fb1e78f710bcc859163e064d91793e5a3b756fe067d97

    • SSDEEP

      24576:DRhMoSwfXo0P9Ej+zE2bb1SfyeeYF2yjfLV/JFzQXYiU4L/E/pWWG8WHHSx44s8/:DgNwfevYoaTerPtsYikWWG8GJ88Y6eb

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks