General

  • Target

    Ergunmakina Fiyat _PER 120 …scanneed 00101.exe

  • Size

    703KB

  • Sample

    230425-h28k6aah6z

  • MD5

    a024dc82d60b3d3f16fd483ffa8c0ef0

  • SHA1

    ee90c1d2a592e865c568e45ca29922f2e8f3ff97

  • SHA256

    b9fc651bcd9745a7fe9aafe13a13e3280f22aa10a50a6b54edc908f783f5fdcf

  • SHA512

    9c35b9c6b9b9905b74bc09ba6f056a684dcce418704237f1a1be0999d59dba4bcf4ac41e5dee27f3525d2348baaa78897976f7ef8dd1e13b424a2206e6dfdaaa

  • SSDEEP

    12288:nvt3YHfXHG38Dv3pqkG6dEFEqDauSocCkIb404LN6N85YR:VIHfXm3CvZnGvEYa15C/b49Lf5YR

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5409839916:AAEYUYZy0IhJQAm4VXi620si4okGW8FDL2w/

Targets

    • Target

      Ergunmakina Fiyat _PER 120 …scanneed 00101.exe

    • Size

      703KB

    • MD5

      a024dc82d60b3d3f16fd483ffa8c0ef0

    • SHA1

      ee90c1d2a592e865c568e45ca29922f2e8f3ff97

    • SHA256

      b9fc651bcd9745a7fe9aafe13a13e3280f22aa10a50a6b54edc908f783f5fdcf

    • SHA512

      9c35b9c6b9b9905b74bc09ba6f056a684dcce418704237f1a1be0999d59dba4bcf4ac41e5dee27f3525d2348baaa78897976f7ef8dd1e13b424a2206e6dfdaaa

    • SSDEEP

      12288:nvt3YHfXHG38Dv3pqkG6dEFEqDauSocCkIb404LN6N85YR:VIHfXm3CvZnGvEYa15C/b49Lf5YR

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks