General

  • Target

    GIBI.exe

  • Size

    930KB

  • Sample

    221208-rsz24adc2v

  • MD5

    f4669b8159d06fd545b1bcf07507ff54

  • SHA1

    0544a42fc5d4b443a9e07b1ff24a65bfa309b7fd

  • SHA256

    d24842b404e95766700c3f37cc0e6266beebd1533082ec7d4443ee61637a2002

  • SHA512

    8887f432064ffe706959a53496bf0a182d8c52eab3c715bda31b2df346903e67818fe5400acd14c9a5888589324f1191c17b0515448a41bd8b463fd9c85aaed2

  • SSDEEP

    24576:IHZFWD781RX1k6zTkaSci1PcBk3WDxwg5+R:l7831kmAFPcUW7e

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot2134979594:AAFk4QkrlHlt2a-q-EhIoHZBbzxSH0QxiBI/sendDocument

Targets

    • Target

      GIBI.exe

    • Size

      930KB

    • MD5

      f4669b8159d06fd545b1bcf07507ff54

    • SHA1

      0544a42fc5d4b443a9e07b1ff24a65bfa309b7fd

    • SHA256

      d24842b404e95766700c3f37cc0e6266beebd1533082ec7d4443ee61637a2002

    • SHA512

      8887f432064ffe706959a53496bf0a182d8c52eab3c715bda31b2df346903e67818fe5400acd14c9a5888589324f1191c17b0515448a41bd8b463fd9c85aaed2

    • SSDEEP

      24576:IHZFWD781RX1k6zTkaSci1PcBk3WDxwg5+R:l7831kmAFPcUW7e

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Drops file in Drivers directory

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks