General

  • Target

    XBH2wJXWhhezh1n.exe

  • Size

    1.0MB

  • Sample

    221122-r1v34sba9w

  • MD5

    895ebaf32f2cf5f84f9cfecf203c9d33

  • SHA1

    2aaccc31c06a2b025b6cf755c6bae0a385568398

  • SHA256

    2980f607058a2ba908559bdedbbd019edd4b52377e5f884d36a62bf9aac8be00

  • SHA512

    6475d02fee2b7721973383ff19ae8f1f085de1c11cab453110678af35cf8ebf58e014e42190e3d778f20b8d9875c451ad9ca323ed4f1e261cf81f7d9f2f60334

  • SSDEEP

    24576:I1u5qdO0LY5A23/vuY0l+2qSf/DEeA+ZeCK:IoqdO0m9T9C/7Ze

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5453942321:AAF6CS9julQ6K7s5pxacNALwWJ2A52D0EC4/

Targets

    • Target

      XBH2wJXWhhezh1n.exe

    • Size

      1.0MB

    • MD5

      895ebaf32f2cf5f84f9cfecf203c9d33

    • SHA1

      2aaccc31c06a2b025b6cf755c6bae0a385568398

    • SHA256

      2980f607058a2ba908559bdedbbd019edd4b52377e5f884d36a62bf9aac8be00

    • SHA512

      6475d02fee2b7721973383ff19ae8f1f085de1c11cab453110678af35cf8ebf58e014e42190e3d778f20b8d9875c451ad9ca323ed4f1e261cf81f7d9f2f60334

    • SSDEEP

      24576:I1u5qdO0LY5A23/vuY0l+2qSf/DEeA+ZeCK:IoqdO0m9T9C/7Ze

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks