General

  • Target

    bb4eac10bd885d26d6cdbe6d0660ba7f.bin

  • Size

    25KB

  • Sample

    230503-chynysdd23

  • MD5

    8afbdd59c2d4c8be605531ce14efadae

  • SHA1

    9dcc05cd543525b5f9756dbb24e768f7671cebd3

  • SHA256

    7375444aba915bc49bc66dbb830fb37dccdd0b9fd7ac5a10f5638b8ff15ab696

  • SHA512

    472fa5e13b6244b2614746b72f90808822f81c4ddee04a30a10da0a64cb7e2d2d093252cecfd9fcc13a49beb45b1ff85d11b1c6422c359e958f45067718587b0

  • SSDEEP

    384:SGjuj9R12131IKB5xFg8qsPr6oqaFBl82iuBL+NyHAe1R9fpWDPuLziOE8RkfQSD:njujc16KoDOBO2i++Mr1R/zdVRg/D

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6249497455:AAGoVzD6c5m-LvGqgHy15Fb8Bph6gAw7SvM/

Targets

    • Target

      a32c204008b19238bf121a713fc57e95eab775cc388f5466e35c0f024750e777.vbs

    • Size

      1.2MB

    • MD5

      bb4eac10bd885d26d6cdbe6d0660ba7f

    • SHA1

      59121e22508485c493d12f8a233df27b7e7ad2bf

    • SHA256

      a32c204008b19238bf121a713fc57e95eab775cc388f5466e35c0f024750e777

    • SHA512

      11af05bff032598539baef418561142da7b6328735d5d2a4733a47df30ee69daed24ecedf573f7fa299a6f876d81faca28fe1da6c961102b29f6179db55ba396

    • SSDEEP

      768:II7XTXBje9YWXA0rsntuTKDsonyd2B2ovOm4LOw7A7PTMYTR:fJj9GPeDsFd2AoR4LFuTR

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks