General

  • Target

    SecuriteInfo.com.Win64.Evo-gen.23783.29810

  • Size

    481KB

  • Sample

    221125-e56n7abe84

  • MD5

    fe9ba4720007e83dce56fc48db01714e

  • SHA1

    22001f0203006ea0ca3770b4f9e7a623b7508e4f

  • SHA256

    9b752fc57f6cd1b2f7869f232c6860adf24bcc3454d330e9f481671b27b7dc0c

  • SHA512

    400d399fc8a1296d02f6828d94a2b4ca98752fabe3940fe0673790f39271a0f119e3684fdfdb95e7045379247a0afdd719eb5d79d83d76846cdf062d0be1163a

  • SSDEEP

    12288:+9N5ED78SX7p+yqWmg1VvagwxOVKTa/qo6b82q3AM0Yn6fEa:+9UMg1+yqkvagfVKTORNhx0Yn6c

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5826208898:AAHq1wGhT3E-mEl-_VCUxWwOZtnwnWe6Rp0/

Targets

    • Target

      SecuriteInfo.com.Win64.Evo-gen.23783.29810

    • Size

      481KB

    • MD5

      fe9ba4720007e83dce56fc48db01714e

    • SHA1

      22001f0203006ea0ca3770b4f9e7a623b7508e4f

    • SHA256

      9b752fc57f6cd1b2f7869f232c6860adf24bcc3454d330e9f481671b27b7dc0c

    • SHA512

      400d399fc8a1296d02f6828d94a2b4ca98752fabe3940fe0673790f39271a0f119e3684fdfdb95e7045379247a0afdd719eb5d79d83d76846cdf062d0be1163a

    • SSDEEP

      12288:+9N5ED78SX7p+yqWmg1VvagwxOVKTa/qo6b82q3AM0Yn6fEa:+9UMg1+yqkvagfVKTORNhx0Yn6c

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • UAC bypass

    • Windows security bypass

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks