General

  • Target

    eff08088f90a7edb6db9e6561249dce53c56c4a682cd114e43befabed147fc40

  • Size

    1.4MB

  • Sample

    230103-gepzvsac94

  • MD5

    1e667b9347d95ae3ed896fd2d7a07004

  • SHA1

    8acc1da971d6c41224cb3a4ecea6d8cfd17d463e

  • SHA256

    eff08088f90a7edb6db9e6561249dce53c56c4a682cd114e43befabed147fc40

  • SHA512

    da2f988d322aedfae77d5146ec8dbfbc8221448b5f09fac67f2e6f71dec363dc996fe44d8903b6dc125b2f7d9dd4cf41d478653e3162a5897fc5de6e656e6b52

  • SSDEEP

    24576:QAOcZNO5kFiNBfipwizdoq21GhKP770lYglQTQD3+L8Fl:OEsNQdXo7IlYgaG+L0l

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot1836400811:AAHbceSsBewgu2-18DdhyOIr5kwyIr-_36E/

Targets

    • Target

      eff08088f90a7edb6db9e6561249dce53c56c4a682cd114e43befabed147fc40

    • Size

      1.4MB

    • MD5

      1e667b9347d95ae3ed896fd2d7a07004

    • SHA1

      8acc1da971d6c41224cb3a4ecea6d8cfd17d463e

    • SHA256

      eff08088f90a7edb6db9e6561249dce53c56c4a682cd114e43befabed147fc40

    • SHA512

      da2f988d322aedfae77d5146ec8dbfbc8221448b5f09fac67f2e6f71dec363dc996fe44d8903b6dc125b2f7d9dd4cf41d478653e3162a5897fc5de6e656e6b52

    • SSDEEP

      24576:QAOcZNO5kFiNBfipwizdoq21GhKP770lYglQTQD3+L8Fl:OEsNQdXo7IlYgaG+L0l

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks