General

  • Target

    BANK SWIFT.xls

  • Size

    169KB

  • Sample

    230316-tryhzsbg37

  • MD5

    de538eed80d8fd3d08ca320457cc5fef

  • SHA1

    3880dcaebb4805aa968c118ceabc351d18ed27df

  • SHA256

    dc0b46a0add517f632937b605ff9d0820f8fefaf1e886c1ad3d0054d50a2a53e

  • SHA512

    1078f55767a5476f83ee529ae552a68c5fb71ed54258f13350304d795ca7f1127431fd66b283b3f5cafc5283371c8f2f3f37ac5844578ae8270574913cb66c93

  • SSDEEP

    3072:gkZ+RwPONXoRjDhIcp0fDlaGGx+cL26nAHeN2E:NZ+RwPONXoRjDhIcp0fDlavx+W26nAHc

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot2134979594:AAFk4QkrlHlt2a-q-EhIoHZBbzxSH0QxiBI/

Targets

    • Target

      BANK SWIFT.xls

    • Size

      169KB

    • MD5

      de538eed80d8fd3d08ca320457cc5fef

    • SHA1

      3880dcaebb4805aa968c118ceabc351d18ed27df

    • SHA256

      dc0b46a0add517f632937b605ff9d0820f8fefaf1e886c1ad3d0054d50a2a53e

    • SHA512

      1078f55767a5476f83ee529ae552a68c5fb71ed54258f13350304d795ca7f1127431fd66b283b3f5cafc5283371c8f2f3f37ac5844578ae8270574913cb66c93

    • SSDEEP

      3072:gkZ+RwPONXoRjDhIcp0fDlaGGx+cL26nAHeN2E:NZ+RwPONXoRjDhIcp0fDlavx+W26nAHc

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks