General

  • Target

    2d334ff51483236fa87270be95e77b196989ca1c9bea4d803aa059c4758a917c

  • Size

    1.0MB

  • Sample

    220414-ptb1jsggcn

  • MD5

    e534b53d075fe29c9aa3030b7f4cd661

  • SHA1

    7369f1567d017938b715d624d4635f867d24989a

  • SHA256

    2d334ff51483236fa87270be95e77b196989ca1c9bea4d803aa059c4758a917c

  • SHA512

    ee6ca412f6b8b71d1eadb64ebf8915cda679e2c98fa80cd84119934beea3c75121b2a6bbe8075907b95c77e96698bbf8d383cc59a7dde7931712ecace321c569

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot1495483448:AAGd3prw4Kj-_QDn5QOZCeOnj6Y116TT7Wg/sendDocument

Targets

    • Target

      2d334ff51483236fa87270be95e77b196989ca1c9bea4d803aa059c4758a917c

    • Size

      1.0MB

    • MD5

      e534b53d075fe29c9aa3030b7f4cd661

    • SHA1

      7369f1567d017938b715d624d4635f867d24989a

    • SHA256

      2d334ff51483236fa87270be95e77b196989ca1c9bea4d803aa059c4758a917c

    • SHA512

      ee6ca412f6b8b71d1eadb64ebf8915cda679e2c98fa80cd84119934beea3c75121b2a6bbe8075907b95c77e96698bbf8d383cc59a7dde7931712ecace321c569

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Meta Stealer Stealer

      Meta Stealer steals passwords stored in browsers, written in C++.

    • AgentTesla Payload

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks