{"id":1337,"date":"2020-03-23T18:45:30","date_gmt":"2020-03-23T18:45:30","guid":{"rendered":"http:\/\/www.herbiez.com\/?p=1337"},"modified":"2020-03-23T18:45:30","modified_gmt":"2020-03-23T18:45:30","slug":"2020-03-23-agent-telsa-malspam","status":"publish","type":"post","link":"https:\/\/www.herbiez.com\/?p=1337","title":{"rendered":"2020-03-23 Agent Telsa Malspam"},"content":{"rendered":"<p>Meta<br \/>\n=====<\/p>\n<p>From: Procurement &#8211; site@hamnc.com<br \/>\nSubject: Purchase Order<br \/>\nAttachment: Company Profile, Product Specification And Trial Order.pdf.img<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2020\/03\/emails.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2020\/03\/emails.png\" alt=\"\" width=\"876\" height=\"636\" class=\"aligncenter size-full wp-image-1338\" \/><\/a><\/p>\n<p>Running this in my VM I am seeing the usual call to get the external IP address of the system (api.ipify.org) and then the data exfil via mail.gandi.net over port 587 (TCP). The interesting thing is the persistence that was setup. Persistence was setup via the Windows Task Scheduler as seen below. The file that is being used in the Task Scheduler has the same hash as the file in the attachment. The location of this file (doQsVLzQv.exe) can be found in the &#8220;C:\\Users\\%username%\\AppData\\Roaming&#8221; folder.<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2020\/03\/persistence.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2020\/03\/persistence.png\" alt=\"\" width=\"1707\" height=\"994\" class=\"aligncenter size-full wp-image-1339\" \/><\/a><\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2020\/03\/wireshark.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2020\/03\/wireshark.png\" alt=\"\" width=\"1704\" height=\"170\" class=\"aligncenter size-full wp-image-1341\" \/><\/a><\/p>\n<p>When looking at the results from a simple filter in Process Monitor (Process name = Company Profile, Product Specification And Trial Order.pdf.exe and Operation = QueryDirectory and Operation = QueryNetworkOpenInformationFile) we can see that the malware is looking for the usual things (ie: installed applications and creds). <\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2020\/03\/processMonitor.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2020\/03\/processMonitor.png\" alt=\"\" width=\"1708\" height=\"998\" class=\"aligncenter size-full wp-image-1340\" \/><\/a><\/p>\n<p>Artifacts can be found over at my Github located <a href=\"http:\/\/github.com\/bloomer1016\/2020-03-23-agent-telsa\" rel=\"noopener noreferrer\" target=\"_blank\">here<\/a>.<\/p>\n<p>Reference<br \/>\n==========<\/p>\n<p><a href=\"http:\/\/www.virustotal.com\/gui\/file\/398326880d507f3c7731113a7c2630e01df8a3013422346c12e55d5ab76efd19\/community\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/www.virustotal.com\/gui\/file\/398326880d507f3c7731113a7c2630e01df8a3013422346c12e55d5ab76efd19\/community<\/a><br \/>\n<a href=\"http:\/\/bazaar.abuse.ch\/sample\/398326880d507f3c7731113a7c2630e01df8a3013422346c12e55d5ab76efd19\/\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/bazaar.abuse.ch\/sample\/398326880d507f3c7731113a7c2630e01df8a3013422346c12e55d5ab76efd19\/<\/a><br \/>\n<a href=\"http:\/\/malshare.com\/sample.php?action=detail&amp;hash=b72502adc492cd694cd064d56a93fed5\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/malshare.com\/sample.php?action=detail&amp;hash=b72502adc492cd694cd064d56a93fed5<\/a><br \/>\n<a href=\"http:\/\/app.any.run\/tasks\/dd1cf69a-09a0-4664-a7a2-752fe5449c43\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/app.any.run\/tasks\/dd1cf69a-09a0-4664-a7a2-752fe5449c43<\/a><\/p>\n<p>Artifacts<br \/>\n==========<\/p>\n<p>IOCs<br \/>\n&#8212;&#8211;<\/p>\n<p>mail.gandi.net:587 (TCP)<\/p>\n<p>Email hashes<br \/>\n&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p>bcf37b670630f8834c9bd263347071b9a46230ef576681ce9c06ce541c6b8790 &#8212; gtyoyi630112974655.eml<br \/>\nf160a285f7602e4e406ee7c3e2708035c27864ddd8c943a4320bca9062388053 &#8212; hsmeyc831822974665.eml<br \/>\nf6efc1aec315b5a410c48b49cb8c538a86d12bed3d6b5f7155fc87a15045ea27 &#8212; iyhdyx543761974662.eml<br \/>\n616576256b6b137c7cee036503a35361ab2b94e003ad585f361bef24ee01b179 &#8212; jsyjse866746974660.eml<br \/>\n6e49dd91110f1c7bce55696ccc6db1e1ae4b49dc83144dafcdf722a592458fa1 &#8212; kkpenr753224974660.eml<br \/>\n7b1a3cbb808a4797132fab4d7d00f7123117022f0b3ba0ed45dc3ae7da689ee5 &#8212; lmdrjp449105974662.eml<br \/>\nda3e59d57ccdfb336afdb452ca366a2eb663582a360adfd20475d0b936285bd3 &#8212; pmzdyv370806974662.eml<br \/>\n980c16beea6827fac0a763c67bfb59b9252d6f8d9e041f3460f70671030ba724 &#8212; tonfxb666161974660.eml<br \/>\ncbe2f144d554f092e3ac98e555d2da27f2e7f86e660637122c87466db6bd1fbd &#8212; xgybkt701416974655.eml<\/p>\n<p>File hashes<br \/>\n&#8212;&#8212;&#8212;&#8212;<\/p>\n<p>88267f2e2bea9ad5c656487aa738ceb3bf13b008e9b4088d9ea68ed7711c2836 &#8212; Company Profile, Product Specification And Trial Order.pdf.img<br \/>\n398326880d507f3c7731113a7c2630e01df8a3013422346c12e55d5ab76efd19 &#8212; Company Profile, Product Specification And Trial Order.exe<br \/>\n398326880d507f3c7731113a7c2630e01df8a3013422346c12e55d5ab76efd19 &#8212; doQsVLzQv.exe<br \/>\n&#8211; File location: C:\\Users\\%username%\\AppData\\Roaming<\/p>\n<p>Machinae results<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n<p>$ machinae 398326880d507f3c7731113a7c2630e01df8a3013422346c12e55d5ab76efd19 88267f2e2bea9ad5c656487aa738ceb3bf13b008e9b4088d9ea68ed7711c2836<br \/>\n[.] Requesting http:\/\/www.virustotal.com\/vtapi\/v2\/file\/report?apikey=XXX&amp;resource=398326880d507f3c7731113a7c2630e01df8a3013422346c12e55d5ab76efd19 (GET)<br \/>\n[.] Requesting http:\/\/www.virustotal.com\/vtapi\/v2\/file\/report?apikey=XXX&amp;resource=88267f2e2bea9ad5c656487aa738ceb3bf13b008e9b4088d9ea68ed7711c2836 (GET)<br \/>\n********************************************************************************<br \/>\n* Information for 398326880d507f3c7731113a7c2630e01df8a3013422346c12e55d5ab76efd19<br \/>\n* Observable type: hash.sha256 (Auto-detected: True)<br \/>\n********************************************************************************<br \/>\nNot seeing what you expect? Likely not a valid site. Try running with &#8211;list-sites<\/p>\n<p>[+] VirusTotal File Report Results<br \/>\n[-] Date submitted: 2020-03-23 08:46:30<br \/>\n[-] Detected engines: 10<br \/>\n[-] Total engines: 72<br \/>\n[-] Scans: (&#8216;FireEye&#8217;, &#8216;Generic[.]mg.b72502adc492cd69&#8217;)<br \/>\n[-] Scans: (&#8216;Cylance&#8217;, &#8216;Unsafe&#8217;)<br \/>\n[-] Scans: (&#8216;Sangfor&#8217;, &#8216;Malware&#8217;)<br \/>\n[-] Scans: (&#8216;Alibaba&#8217;, &#8216;Trojan:Win32\/starter[.]ali1000139&#8217;)<br \/>\n[-] Scans: (&#8216;Cybereason&#8217;, &#8216;malicious.176ae4&#8217;)<br \/>\n[-] Scans: (&#8216;ESET-NOD32&#8217;, &#8216;a variant of MSIL\/GenKryptik[.]EGKX&#8217;)<br \/>\n[-] Scans: (&#8216;Ikarus&#8217;, &#8216;Trojan[.]Agent[.]EX&#8217;)<br \/>\n[-] Scans: (&#8216;Microsoft&#8217;, &#8216;Trojan:Win32\/Wacatac.C!ml&#8217;)<br \/>\n[-] Scans: (&#8216;Malwarebytes&#8217;, &#8216;Trojan[.]MalPack[.]ADC&#8217;)<br \/>\n[-] Scans: (&#8216;APEX&#8217;, &#8216;Malicious&#8217;)<br \/>\n********************************************************************************<br \/>\n* Information for 88267f2e2bea9ad5c656487aa738ceb3bf13b008e9b4088d9ea68ed7711c2836<br \/>\n* Observable type: hash.sha256 (Auto-detected: True)<br \/>\n********************************************************************************<br \/>\nNot seeing what you expect? Likely not a valid site. Try running with &#8211;list-sites<\/p>\n<p>[+] VirusTotal File Report Results<br \/>\n[-] Date submitted: 2020-03-23 13:55:36<br \/>\n[-] Detected engines: 12<br \/>\n[-] Total engines: 61<br \/>\n[-] Scans: (&#8216;Sangfor&#8217;, &#8216;Malware&#8217;)<br \/>\n[-] Scans: (&#8216;Symantec&#8217;, &#8216;Trojan[.]Gen.2&#8217;)<br \/>\n[-] Scans: (&#8216;TrendMicro-HouseCall&#8217;, &#8216;Possible_GENISO-6&#8217;)<br \/>\n[-] Scans: (&#8216;Rising&#8217;, &#8216;Trojan[.]GenKryptik!8.AA55 (CLOUD)&#8217;)<br \/>\n[-] Scans: (&#8216;TrendMicro&#8217;, &#8216;Possible_GENISO-6&#8217;)<br \/>\n[-] Scans: (&#8216;McAfee-GW-Edition&#8217;, &#8216;Artemis!B72502ADC492&#8217;)<br \/>\n[-] Scans: (&#8216;Ikarus&#8217;, &#8216;Trojan[.]Agent[.]EX&#8217;)<br \/>\n[-] Scans: (&#8216;Cyren&#8217;, &#8216;W32\/MSIL_Kryptik[.]AJW[.]gen!Eldorado&#8217;)<br \/>\n[-] Scans: (&#8216;Fortinet&#8217;, &#8216;MSIL\/GenKryptik[.]EGKX!tr&#8217;)<br \/>\n[-] Scans: (&#8216;Microsoft&#8217;, &#8216;Trojan:Win32\/Wacatac.C!ml&#8217;)<br \/>\n[-] Scans: (&#8216;McAfee&#8217;, &#8216;Artemis!B72502ADC492&#8217;)<br \/>\n[-] Scans: (&#8216;ESET-NOD32&#8217;, &#8216;a variant of MSIL\/GenKryptik[.]EGVF&#8217;)<\/p>\n<p>$ machinae mail.gandi.net<br \/>\n[.] Requesting http:\/\/www.urlvoid.com\/scan\/mail.gandi.net (GET)<br \/>\n[.] Requesting http:\/\/www.toolsvoid.com\/unshorten-url (POST)<br \/>\n[.] Requesting http:\/\/malc0de.com\/database\/index.php?search=mail.gandi.net (GET)<br \/>\n[.] Requesting http:\/\/www.fortiguard.com\/webfilter?q=mail.gandi.net (GET)<br \/>\n[.] Requesting http:\/\/www.virustotal.com\/vtapi\/v2\/domain\/report?domain=mail.gandi.net&amp;apikey=XXX (GET)<br \/>\n[.] Requesting http:\/\/www.reputationauthority.org\/lookup.php?ip=mail.gandi.net (GET)<br \/>\n[.] Requesting http:\/\/www.mcafee.com\/threat-intelligence\/domain\/default.aspx?domain=mail.gandi.net (GET)<br \/>\n[.] Requesting http:\/\/cymon.io\/api\/nexus\/v1\/domain\/mail.gandi.net (GET)<br \/>\n********************************************************************************<br \/>\n* Information for mail.gandi.net<br \/>\n* Observable type: fqdn (Auto-detected: True)<br \/>\n********************************************************************************<br \/>\nNot seeing what you expect? Likely not a valid site. Try running with &#8211;list-sites<\/p>\n<p>[-] No URLVoid Results<br \/>\n[-] No URL Unshorten Results<br \/>\n[-] No Malc0de Results<br \/>\n[+] Fortinet Category Results<br \/>\n[-] Fortinet URL Category: Web-based Email<br \/>\n[+] VirusTotal pDNS Results<br \/>\n[-] pDNS data from VirusTotal: (&#8216;2019-12-12&#8217;, &#8216;217[.]70.178.9&#8217;)<br \/>\n[-] pDNS data from VirusTotal: (&#8216;2014-05-15&#8217;, &#8216;217[.]70.184.11&#8217;)<br \/>\n[-] Webutation Safety score: 100<br \/>\n[+] Reputation Authority Results<br \/>\n[-] Reputation Authority Score: 50\/100<br \/>\n[+] McAfee Threat Results<br \/>\n[-] McAfee Web Risk: Minimal<br \/>\n[-] McAfee Last Seen: 2020-03-23<\/p>\n<p>Munin results<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n<p>1 \/ 3 &gt; Suspicious<br \/>\nHASH: 398326880d507f3c7731113a7c2630e01df8a3013422346c12e55d5ab76efd19 COMMENT: doQsVLzQv.exe<br \/>\nVIRUS: Microsoft: Trojan:Win32\/Wacatac.C!ml \/ ESET-NOD32: a variant of MSIL\/GenKryptik.EGKX<br \/>\nTYPE: Win32 EXE SIZE: 779.5 KB FILENAMES: vjKPwLdpyllsI.exe, doqsvlzqv.exe, Company Profile, Product Specification And Trial Order.exe, vjKPwLdpyllsI.exe<br \/>\nCOPYRIGHT: Copyright 2019 DESCRIPTION: Calculator<br \/>\nFIRST: 2020-03-23 08:46:30 LAST: 2020-03-23 08:46:30 SUBMISSIONS: 1 REPUTATION: 0<br \/>\nCOMMENTS: 1 USERS: thor TAGS: PEEXE ASSEMBLY DIRECT-CPU-CLOCK-ACCESS DETECT-DEBUG-ENVIRONMENT RUNTIME-MODULES<br \/>\nRESULT: 10 \/ 72<br \/>\n[!] Sample on ANY.RUN URL: <a href=\"http:\/\/any.run\/report\/398326880d507f3c7731113a7c2630e01df8a3013422346c12e55d5ab76efd19\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/any.run\/report\/398326880d507f3c7731113a7c2630e01df8a3013422346c12e55d5ab76efd19<\/a><\/p>\n<p>2 \/ 3 &gt; Suspicious<br \/>\nHASH: 398326880d507f3c7731113a7c2630e01df8a3013422346c12e55d5ab76efd19 COMMENT: Company Profile Product Specification And Trial Order.exe<br \/>\nVIRUS: Microsoft: Trojan:Win32\/Wacatac.C!ml \/ ESET-NOD32: a variant of MSIL\/GenKryptik.EGKX<br \/>\nTYPE: Win32 EXE SIZE: 779.5 KB FILENAMES: vjKPwLdpyllsI.exe, doqsvlzqv.exe, Company Profile, Product Specification And Trial Order.exe, vjKPwLdpyllsI.exe<br \/>\nCOPYRIGHT: Copyright 2019 DESCRIPTION: Calculator<br \/>\nFIRST: 2020-03-23 08:46:30 LAST: 2020-03-23 08:46:30 SUBMISSIONS: 1 REPUTATION: 0<br \/>\nCOMMENTS: 1 USERS: thor TAGS: PEEXE ASSEMBLY DIRECT-CPU-CLOCK-ACCESS DETECT-DEBUG-ENVIRONMENT RUNTIME-MODULES<br \/>\nRESULT: 10 \/ 72<br \/>\n[!] Imphash &#8211; appeared 2 times in this batch f34d5f2d4577ed6d9ceec516c1f5a744<br \/>\n[!] Sample on ANY.RUN URL: <a href=\"http:\/\/any.run\/report\/398326880d507f3c7731113a7c2630e01df8a3013422346c12e55d5ab76efd19\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/any.run\/report\/398326880d507f3c7731113a7c2630e01df8a3013422346c12e55d5ab76efd19<\/a><\/p>\n<p>3 \/ 3 &gt; Malicious<br \/>\nHASH: 88267f2e2bea9ad5c656487aa738ceb3bf13b008e9b4088d9ea68ed7711c2836 COMMENT: Company Profile Product Specification And Trial Order.pdf.img<br \/>\nVIRUS: Microsoft: Trojan:Win32\/Wacatac.C!ml \/ McAfee: Artemis!B72502ADC492 \/ TrendMicro: Possible_GENISO-6 \/ ESET-NOD32: a variant of MSIL\/GenKryptik.EGVF \/ Symantec: Trojan.Gen.2<br \/>\nTYPE: unknown SIZE: 1.31 MB FILENAMES: mime-part&#8211;27738-3415.img, mime-part&#8211;27738-3415.img<br \/>\nFIRST: 2020-03-23 08:46:26 LAST: 2020-03-23 13:55:36 SUBMISSIONS: 1 REPUTATION: 0<br \/>\nCOMMENTS: 0 USERS: &#8211; TAGS: CONTAINS-PE<br \/>\nRESULT: 12 \/ 61<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Meta ===== From: Procurement &#8211; site@hamnc.com Subject: Purchase Order Attachment: Company Profile, Product Specification And Trial Order.pdf.img Running this in my VM I am seeing the usual call to get the external IP address of the system (api.ipify.org) and then the data exfil via mail.gandi.net over port 587 (TCP). The interesting thing is the persistence that was setup. Persistence was setup via the Windows Task Scheduler as seen below. The file that is being used in the Task Scheduler has the same hash as the file in the attachment. The location of this file (doQsVLzQv.exe) can be found in the&#8230;<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/www.herbiez.com\/?p=1337\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[30],"class_list":["post-1337","post","type-post","status-publish","format-standard","hentry","category-packet-analysis","tag-agent-telsa"],"_links":{"self":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/1337","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1337"}],"version-history":[{"count":2,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/1337\/revisions"}],"predecessor-version":[{"id":1343,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/1337\/revisions\/1343"}],"wp:attachment":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1337"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1337"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}