General

  • Target

    f02f1ee4b884169c99d73ec240cbc150933f34e1da80be8d310de7b05d3693ee.exe

  • Size

    457KB

  • Sample

    250129-d7xzdszmfv

  • MD5

    cfcfe12e9d008183a9ab07c25d8bb0d9

  • SHA1

    9a4685717ef8485e57cc8b0639ee100cdd09cd4d

  • SHA256

    f02f1ee4b884169c99d73ec240cbc150933f34e1da80be8d310de7b05d3693ee

  • SHA512

    91d64acdaa861ea346a306e48e0a350eaea87bf315b7f041bcd76fdcea054cdee6fe22c12f5dbd04d4c842c42cb44f4fee904be3644d85388b255818da3db967

  • SSDEEP

    6144:uOdtnDXZoPTyEipmPG8t5z9H77bGn3G/5U+jwOp1dKimbIJX4W2UkyIzMu+2SPBk:rdVzZo7yr8t52+jHboWwXz42SPBXU2w

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Family

xworm

C2

89.40.31.232:1717

Attributes
  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk/sendMessage?chat_id=793028759

Targets

    • Target

      f02f1ee4b884169c99d73ec240cbc150933f34e1da80be8d310de7b05d3693ee.exe

    • Size

      457KB

    • MD5

      cfcfe12e9d008183a9ab07c25d8bb0d9

    • SHA1

      9a4685717ef8485e57cc8b0639ee100cdd09cd4d

    • SHA256

      f02f1ee4b884169c99d73ec240cbc150933f34e1da80be8d310de7b05d3693ee

    • SHA512

      91d64acdaa861ea346a306e48e0a350eaea87bf315b7f041bcd76fdcea054cdee6fe22c12f5dbd04d4c842c42cb44f4fee904be3644d85388b255818da3db967

    • SSDEEP

      6144:uOdtnDXZoPTyEipmPG8t5z9H77bGn3G/5U+jwOp1dKimbIJX4W2UkyIzMu+2SPBk:rdVzZo7yr8t52+jHboWwXz42SPBXU2w

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Detect Xworm Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks