{"id":1344,"date":"2020-03-26T01:30:22","date_gmt":"2020-03-26T01:30:22","guid":{"rendered":"http:\/\/www.herbiez.com\/?p=1344"},"modified":"2020-03-26T01:35:03","modified_gmt":"2020-03-26T01:35:03","slug":"2020-03-25-agent-telsa-malspam-covid-19-themed","status":"publish","type":"post","link":"https:\/\/www.herbiez.com\/?p=1344","title":{"rendered":"2020-03-25 Agent Telsa Malspam &#8211; Covid-19 Themed"},"content":{"rendered":"<p><strong>Meta<br \/>\n=====<\/strong><br \/>\nFrom: World Health Organization<br \/>\nSubject: COVID 19: Passaggi Medici Per Essere Sicuri<br \/>\nLink in the email: hxxps:\/\/onedrive[.]live[.]com\/download?cid=265DAF943BE0D06F&amp;resid=265DAF943BE0D06F%21177&amp;authkey=AIGcwdd1XE_CXLM<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2020\/03\/email-1.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2020\/03\/email-1.png\" alt=\"\" width=\"671\" height=\"782\" class=\"aligncenter size-full wp-image-1347\" \/><\/a><\/p>\n<p>Unlike the other one that I documented <a href=\"http:\/\/www.herbiez.com\/?p=1337\" rel=\"noopener noreferrer\" target=\"_blank\">here<\/a> I could not find any method of persistence in this infection. Also, once the EXE from the ISO has been extracted and executed, it created a child process of &#8220;RegAsm.exe&#8221; to do the heavy lifting while terminating itself as you can see in the below image. This is the process that made the callouts to the couple of IP addresses seen (including data exfil via port 587).<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2020\/03\/procmon-tree.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2020\/03\/procmon-tree.png\" alt=\"\" width=\"1487\" height=\"682\" class=\"aligncenter size-full wp-image-1345\" \/><\/a><\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2020\/03\/procmon-network.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2020\/03\/procmon-network.png\" alt=\"\" width=\"646\" height=\"72\" class=\"aligncenter size-full wp-image-1346\" \/><\/a><\/p>\n<p>Outside of that this was your normal run of Agent Telsa. Artifacts and PCAP can be found over in my Github repo located <a href=\"http:\/\/github.com\/bloomer1016\/2020-03-25-agent-telsa\" rel=\"noopener noreferrer\" target=\"_blank\">here<\/a>.<\/p>\n<p><strong>Reference<br \/>\n==========<\/strong><\/p>\n<p>Malshare: <a href=\"http:\/\/malshare.com\/sample.php?action=detail&amp;hash=9fed11cd0c0bc367b30b08650dfba78f\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/malshare.com\/sample.php?action=detail&amp;hash=9fed11cd0c0bc367b30b08650dfba78f<\/a><br \/>\nMalwareBazaar: <a href=\"http:\/\/bazaar.abuse.ch\/sample\/c7c2e3e6dc40ec793635b6f18e44223d8cbf9fb621ee0d5b374b709510fe2d9a\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/bazaar.abuse.ch\/sample\/c7c2e3e6dc40ec793635b6f18e44223d8cbf9fb621ee0d5b374b709510fe2d9a<\/a> | <a href=\"http:\/\/bazaar.abuse.ch\/sample\/b0d9703714cc221faaba6dd5c4089f5866e2c2dcc8b342e7dfdd647e29ab4752\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/bazaar.abuse.ch\/sample\/b0d9703714cc221faaba6dd5c4089f5866e2c2dcc8b342e7dfdd647e29ab4752<\/a><br \/>\nAnyRun: <a href=\"http:\/\/app.any.run\/tasks\/8279e4d7-9f37-4f8c-8f50-3f41f4ffc425\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/app.any.run\/tasks\/8279e4d7-9f37-4f8c-8f50-3f41f4ffc425<\/a><br \/>\nTriage: <a href=\"http:\/\/tria.ge\/reports\/200325-ajbtfx9qy2\/static1\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/tria.ge\/reports\/200325-ajbtfx9qy2\/static1<\/a><br \/>\nVT: <a href=\"http:\/\/www.virustotal.com\/gui\/file\/b0d9703714cc221faaba6dd5c4089f5866e2c2dcc8b342e7dfdd647e29ab4752\/detection\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/www.virustotal.com\/gui\/file\/b0d9703714cc221faaba6dd5c4089f5866e2c2dcc8b342e7dfdd647e29ab4752\/detection<\/a> | <a href=\"http:\/\/www.virustotal.com\/gui\/file\/c7c2e3e6dc40ec793635b6f18e44223d8cbf9fb621ee0d5b374b709510fe2d9a\/detection\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/www.virustotal.com\/gui\/file\/c7c2e3e6dc40ec793635b6f18e44223d8cbf9fb621ee0d5b374b709510fe2d9a\/detection<\/a><\/p>\n<p><strong>Artifacts<br \/>\n==========<\/strong><\/p>\n<p><strong>IOCs<br \/>\n&#8212;&#8211;<\/strong><\/p>\n<p>onedrive[.]live[.]com\/download?cid=265DAF943BE0D06F&amp;resid=265DAF943BE0D06F%21177&amp;authkey=AIGcwdd1XE_CXLM &#8211; 13[.]104[.]42[.]13:443 (TCP)<br \/>\ngqa9cw[.]dm[.]files[.]1drv[.]com &#8211; 13[.]104[.]42[.]12:443 (TCP)<br \/>\n63[.]250[.]44[.]99:587 (TCP)<\/p>\n<p><strong>Email hashes<br \/>\n&#8212;&#8212;&#8212;&#8212;-<\/strong><\/p>\n<p>98f1d11511f6bdaaf3a172b28a0684652bb19ea39c9c03226b329808cf06b483 &#8212; babsha925411157092.eml<br \/>\n71a3cf41a223f6acdb9af74c0727b83519cddd4d18dc9d598bd73ff41d022cde &#8212; fqhitf034619157093.eml<br \/>\nc1166cb7826c73bd58df1cc9861fbf803493048e2482f82175b7872d8f35810a &#8212; gsfvxr304743157094.eml<br \/>\nd1f3f9a54b2436dc3295f44f691955b67db26adf023f995223430f9e9c2e1442 &#8212; lkjtis506730157094.eml<br \/>\n9a964c0881dc9304bd8e84a4b5f93cf6364015b497f95713e5014ca4b32cc56f &#8212; lpiepe270366157094.eml<br \/>\na0887c28ea0e3813030955c8406186bd8e3ce3fa8a607e5e9de2dc28e1833f95 &#8212; nqcwpx366703157091.eml<br \/>\nb1d74fa576870db5b03e8f975b339f641454e6b337527367520c01caab38600e &#8212; ousuxu199249157094.eml<br \/>\n2f2a5a968573b732c316c72100fe84083da1258624983d737f35467826994596 &#8212; phwhop078067157093.eml<br \/>\n766e00a8c35d5c5f3da6b04fb99ac68a6410e7cdaea5621cce5ec7a2da3b3f7f &#8212; pnfyxv576698157094.eml<br \/>\n0077b9ca2b884f617fa12e19b924ea70b5bd9a4740a1c7b779ee4bc803d66979 &#8212; sztvxy079777157096.eml<br \/>\n022cf2f0c7a8ead023f3766283d0e80bc7bdcb94b28d6d26683f5f94380285fc &#8212; uoplrc973765157092.eml<br \/>\n3f9451cf771ef7105ba46077818bedf6bedc24545e5949b4d720e64fde1b804e &#8212; wkqfxw145898157093.eml<br \/>\n6d7bec87cf26bd7cead8a60f09cd48b03c71bd96552ccd0a3dd6cd6ccce5e13e &#8212; xvqnoj876256157092.eml<br \/>\n8e0cd347a19c08320db17214831be9bb2d493ecaed4d71845a9c64845e57a803 &#8212; yahguq810702157092.eml<br \/>\nae6e7bb9994c4485d6ece2d184b41c2b1f09f4d98debca3259dd2136221acfc3 &#8212; zrszrs625922157094.eml<\/p>\n<p><strong>File hashes<br \/>\n&#8212;&#8212;&#8212;&#8212;<\/strong><\/p>\n<p>b0d9703714cc221faaba6dd5c4089f5866e2c2dcc8b342e7dfdd647e29ab4752 &#8212; Cure Mediche.iso<br \/>\nc7c2e3e6dc40ec793635b6f18e44223d8cbf9fb621ee0d5b374b709510fe2d9a &#8212; makeve.exe<\/p>\n<p><strong>Machinae results<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/strong><\/p>\n<p>$ machinae b0d9703714cc221faaba6dd5c4089f5866e2c2dcc8b342e7dfdd647e29ab4752 c7c2e3e6dc40ec793635b6f18e44223d8cbf9fb621ee0d5b374b709510fe2d9a<br \/>\n[.] Requesting http:\/\/www.virustotal.com\/vtapi\/v2\/file\/report?apikey=XXX&amp;resource=b0d9703714cc221faaba6dd5c4089f5866e2c2dcc8b342e7dfdd647e29ab4752 (GET)<br \/>\n[.] Requesting http:\/\/www.virustotal.com\/vtapi\/v2\/file\/report?apikey=XXX&amp;resource=c7c2e3e6dc40ec793635b6f18e44223d8cbf9fb621ee0d5b374b709510fe2d9a (GET)<br \/>\n********************************************************************************<br \/>\n* Information for b0d9703714cc221faaba6dd5c4089f5866e2c2dcc8b342e7dfdd647e29ab4752<br \/>\n* Observable type: hash.sha256 (Auto-detected: True)<br \/>\n********************************************************************************<br \/>\nNot seeing what you expect? Likely not a valid site. Try running with &#8211;list-sites<\/p>\n<p>[+] VirusTotal File Report Results<br \/>\n[-] Date submitted: 2020-03-25 12:19:32<br \/>\n[-] Detected engines: 5<br \/>\n[-] Total engines: 60<br \/>\n[-] Scans: (&#8216;BitDefenderTheta&#8217;, &#8216;Gen:NN[.]ZevbaF.34104[.]im0@aK1S9Cmi&#8217;)<br \/>\n[-] Scans: (&#8216;TrendMicro-HouseCall&#8217;, &#8216;Possible_GENISO-4B&#8217;)<br \/>\n[-] Scans: (&#8216;TrendMicro&#8217;, &#8216;Possible_GENISO-4B&#8217;)<br \/>\n[-] Scans: (&#8216;Microsoft&#8217;, &#8216;Trojan:Win32\/Wacatac.C!ml&#8217;)<br \/>\n[-] Scans: (&#8216;Ikarus&#8217;, &#8216;Trojan-Spy[.]Keylogger[.]AgentTesla&#8217;)<br \/>\n********************************************************************************<br \/>\n* Information for c7c2e3e6dc40ec793635b6f18e44223d8cbf9fb621ee0d5b374b709510fe2d9a<br \/>\n* Observable type: hash.sha256 (Auto-detected: True)<br \/>\n********************************************************************************<br \/>\nNot seeing what you expect? Likely not a valid site. Try running with &#8211;list-sites<\/p>\n<p>[+] VirusTotal File Report Results<br \/>\n[-] Date submitted: 2020-03-25 12:19:41<br \/>\n[-] Detected engines: 8<br \/>\n[-] Total engines: 71<br \/>\n[-] Scans: (&#8216;Qihoo-360&#8217;, &#8216;HEUR\/QVM03.0.1EED[.]Malware[.]Gen&#8217;)<br \/>\n[-] Scans: (&#8216;Cylance&#8217;, &#8216;Unsafe&#8217;)<br \/>\n[-] Scans: (&#8216;APEX&#8217;, &#8216;Malicious&#8217;)<br \/>\n[-] Scans: (&#8216;Trapmine&#8217;, &#8216;suspicious.low[.]ml[.]score&#8217;)<br \/>\n[-] Scans: (&#8216;Microsoft&#8217;, &#8216;Trojan:Win32\/Sonbokli.A!cl&#8217;)<br \/>\n[-] Scans: (&#8216;Acronis&#8217;, &#8216;suspicious&#8217;)<br \/>\n[-] Scans: (&#8216;eGambit&#8217;, &#8216;Unsafe[.]AI_Score_97%&#8217;)<br \/>\n[-] Scans: (&#8216;BitDefenderTheta&#8217;, &#8216;Gen:NN[.]ZevbaF.34104[.]im0@aK1S9Cmi&#8217;)<\/p>\n<p>$ machinae 63.250.44.99<br \/>\n[.] Requesting http:\/\/www.ipvoid.com\/ip-blacklist-check (POST)<br \/>\n[.] Requesting http:\/\/malc0de.com\/database\/index.php?search=63.250.44.99 (GET)<br \/>\n[.] Requesting http:\/\/abuseipdb.com\/check\/63.250.44.99 (GET)<br \/>\n[.] Requesting http:\/\/ransomwaretracker.abuse.ch\/host\/63.250.44.99 (GET)<br \/>\n[.] Requesting http:\/\/isc.sans.edu\/api\/ip\/63.250.44.99 (GET)<br \/>\n[.] Requesting http:\/\/freegeoip.io\/json\/63.250.44.99 (GET)<br \/>\n[.] Requesting http:\/\/www.fortiguard.com\/webfilter?q=63.250.44.99 (GET)<br \/>\n[.] Requesting http:\/\/www.virustotal.com\/vtapi\/v2\/ip-address\/report?ip=63.250.44.99&amp;apikey=XXX (GET)<br \/>\n[.] Requesting http:\/\/www.reputationauthority.org\/lookup.php?ip=63.250.44.99 (GET)<br \/>\n[.] Requesting http:\/\/www.mcafee.com\/threat-intelligence\/ip\/default.aspx?ip=63.250.44.99 (GET)<br \/>\n[.] Requesting http:\/\/cymon.io\/api\/nexus\/v1\/ip\/63.250.44.99\/events\/ (GET)<br \/>\n[.] Requesting http:\/\/cymon.io\/api\/nexus\/v1\/ip\/63.250.44.99\/domains\/ (GET)<br \/>\n[.] Requesting http:\/\/cymon.io\/api\/nexus\/v1\/ip\/63.250.44.99\/urls\/ (GET)<br \/>\n[.] Requesting http:\/\/www.threatcrowd.org\/searchApi\/v2\/ip\/report\/?ip=63.250.44.99 (GET)<br \/>\n********************************************************************************<br \/>\n* Information for 63.250.44.99<br \/>\n* Observable type: ipv4 (Auto-detected: True)<br \/>\n********************************************************************************<br \/>\nNot seeing what you expect? Likely not a valid site. Try running with &#8211;list-sites<\/p>\n<p>[!] Error from IP Whois: &#8216;IPWhois&#8217; object has no attribute &#8216;lookup&#8217;<br \/>\n[-] No IPVoid Results<br \/>\n[-] No Malc0de Results<br \/>\n[-] No AbuseIPDB Results<br \/>\n[-] No RansomwareTracker Results<br \/>\n[-] No SANS Results<br \/>\n[+] Fortinet Category Results<br \/>\n    [-] Fortinet URL Category: Not Rated<br \/>\n[+] VirusTotal pDNS Results<br \/>\n    [-] pDNS data from VirusTotal: (&#8216;2020-02-24&#8217;, &#8216;popeorigin[.]pw&#8217;)<br \/>\n    [-] pDNS data from VirusTotal: (&#8216;2020-03-25&#8217;, &#8216;popeorigin5[.]pw&#8217;)<br \/>\n    [-] pDNS data from VirusTotal: (&#8216;2020-02-25&#8217;, &#8216;popeorigin6[.]pw&#8217;)<br \/>\n    [-] pDNS data from VirusTotal: (&#8216;2020-02-25&#8217;, &#8216;popeorigin7[.]pw&#8217;)<br \/>\n    [-] pDNS data from VirusTotal: (&#8216;2020-02-24&#8217;, &#8216;webmail[.]popeorigin[.]pw&#8217;)<br \/>\n    [-] pDNS data from VirusTotal: (&#8216;2020-03-25&#8217;, &#8216;webmail[.]popeorigin5[.]pw&#8217;)<br \/>\n    [-] pDNS data from VirusTotal: (&#8216;2020-02-25&#8217;, &#8216;webmail[.]popeorigin6[.]pw&#8217;)<br \/>\n    [-] pDNS data from VirusTotal: (&#8216;2020-02-24&#8217;, &#8216;www[.]popeorigin[.]pw&#8217;)<br \/>\n    [-] pDNS data from VirusTotal: (&#8216;2020-03-25&#8217;, &#8216;www[.]popeorigin5[.]pw&#8217;)<br \/>\n    [-] pDNS data from VirusTotal: (&#8216;2020-02-25&#8217;, &#8216;www[.]popeorigin6[.]pw&#8217;)<br \/>\n    [-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-20&#8217;, &#8216;hXXp:\/\/popeorigin7[.]pw\/&#8217;)<br \/>\n[+] Reputation Authority Results<br \/>\n    [-] Reputation Authority Score: 50\/100<br \/>\n[-] No McAfee Threat Results<\/p>\n<p><strong>Munin results<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8211;<\/strong><\/p>\n<p>1 \/ 2 &gt; Suspicious<br \/>\nHASH: b0d9703714cc221faaba6dd5c4089f5866e2c2dcc8b342e7dfdd647e29ab4752 COMMENT: Cure Mediche.iso<br \/>\nVIRUS: Microsoft: Trojan:Win32\/Wacatac.C!ml \/ TrendMicro: Possible_GENISO-4B<br \/>\nTYPE: ISO image SIZE: 196.0 KB FILENAMES: Cure Mediche.iso, Cure Mediche.iso<br \/>\nFIRST: 2020-03-25 12:19:32 LAST: 2020-03-25 12:19:32 SUBMISSIONS: 1 REPUTATION: 0<br \/>\nCOMMENTS: 0 USERS: &#8211; TAGS: CONTAINS-PE ISOIMAGE<br \/>\nRESULT: 5 \/ 60<\/p>\n<p>2 \/ 2 &gt; Malicious<br \/>\nHASH: c7c2e3e6dc40ec793635b6f18e44223d8cbf9fb621ee0d5b374b709510fe2d9a COMMENT: makeve.exe<br \/>\nVIRUS: Microsoft: Trojan:Win32\/Fareit.AE!MTB \/ Kaspersky: Trojan.Win32.Vebzenpak.kbd \/ McAfee: Artemis!9FED11CD0C0B \/ CrowdStrike: win\/malicious_confidence_80% (W) \/ ESET-NOD32: a variant of Win32\/Injector.ELFS \/ GData: Win32.Trojan.Agent.5YQ2H5<br \/>\nTYPE: Win32 EXE SIZE: 136.0 KB FILENAMES: Enterophth8.exe, Enterophth8, Enterophth8.exe, makeve.exe<br \/>\nFIRST: 2020-03-25 12:19:41 LAST: 2020-03-25 23:24:54 SUBMISSIONS: 1 REPUTATION: 0<br \/>\nCOMMENTS: 1 USERS: VMRay TAGS: PEEXE RUNTIME-MODULES DIRECT-CPU-CLOCK-ACCESS CHECKS-USER-INPUT<br \/>\nRESULT: 21 \/ 71<br \/>\n[!] Sample on ANY.RUN URL: <a href=\"http:\/\/any.run\/report\/c7c2e3e6dc40ec793635b6f18e44223d8cbf9fb621ee0d5b374b709510fe2d9a\">http:\/\/any.run\/report\/c7c2e3e6dc40ec793635b6f18e44223d8cbf9fb621ee0d5b374b709510fe2d9a<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Meta ===== From: World Health Organization Subject: COVID 19: Passaggi Medici Per Essere Sicuri Link in the email: hxxps:\/\/onedrive[.]live[.]com\/download?cid=265DAF943BE0D06F&amp;resid=265DAF943BE0D06F%21177&amp;authkey=AIGcwdd1XE_CXLM Unlike the other one that I documented here I could not find any method of persistence in this infection. Also, once the EXE from the ISO has been extracted and executed, it created a child process of &#8220;RegAsm.exe&#8221; to do the heavy lifting while terminating itself as you can see in the below image. This is the process that made the callouts to the couple of IP addresses seen (including data exfil via port 587). Outside of that this was your&#8230;<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/www.herbiez.com\/?p=1344\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[30],"class_list":["post-1344","post","type-post","status-publish","format-standard","hentry","category-packet-analysis","tag-agent-telsa"],"_links":{"self":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/1344","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1344"}],"version-history":[{"count":3,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/1344\/revisions"}],"predecessor-version":[{"id":1350,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/1344\/revisions\/1350"}],"wp:attachment":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1344"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1344"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}