General

  • Target

    Order.xls

  • Size

    1.0MB

  • Sample

    221123-qxdh8afa82

  • MD5

    6adcba987bdbba646e38483eec46c072

  • SHA1

    bff302a72c68fa89aaf0c709e7065b2c547736de

  • SHA256

    14c55731e7390ce071bd81cceaf4410175304f3e42dd74e880c212a1d51fd30f

  • SHA512

    d7eec8d305349a0e7891a2efeee789f10524e6dee8030bea99119b250e1759bc90937fb078f2fd1d1ecfeff9ddf304764053180cc4bbb35416a65551ce8082b7

  • SSDEEP

    24576:/r5XXXXXXXXXXXXUXXXXXXXSXXXXXXXXJmMr5XXXXXXXXXXXXUXXXXXXXSXXXXXr:TX

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot1900392974:AAEB_yGGlWksNcNC4Dg08OgUSlmDON2w098/sendDocument

Targets

    • Target

      Order.xls

    • Size

      1.0MB

    • MD5

      6adcba987bdbba646e38483eec46c072

    • SHA1

      bff302a72c68fa89aaf0c709e7065b2c547736de

    • SHA256

      14c55731e7390ce071bd81cceaf4410175304f3e42dd74e880c212a1d51fd30f

    • SHA512

      d7eec8d305349a0e7891a2efeee789f10524e6dee8030bea99119b250e1759bc90937fb078f2fd1d1ecfeff9ddf304764053180cc4bbb35416a65551ce8082b7

    • SSDEEP

      24576:/r5XXXXXXXXXXXXUXXXXXXXSXXXXXXXXJmMr5XXXXXXXXXXXXUXXXXXXXSXXXXXr:TX

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

MITRE ATT&CK Enterprise v6

Tasks