General

  • Target

    rPEDIDON1525.exe.bin

  • Size

    578KB

  • Sample

    230505-zrcjeagg4s

  • MD5

    d9380760cb8961a7aabe2fffd83b1296

  • SHA1

    70c61249c207a0d42fef27f830f978fa5ac9610b

  • SHA256

    d26b936b2d61001819fc4e99a224224d35edd9fd716bfe7bc5dbd431f584150e

  • SHA512

    2602f887156d9feee028f559de2ce282bf43bcbd1a008308d3e11996d5ac159d07249f5e57206ff646fbefdd2e9910558751937b33a79de7f477dfd04430c453

  • SSDEEP

    12288:l89hFSSKDgBzCddx27SuzW9KcfTAyrRQ0tqwDhp:l8bs7DgBz62BWwOAyr6tshp

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot1360033246:AAF6H8m6YrL09doyxtsvJzZ_cIl__BCF4aU/sendDocument

Targets

    • Target

      rPEDIDON1525.exe.bin

    • Size

      578KB

    • MD5

      d9380760cb8961a7aabe2fffd83b1296

    • SHA1

      70c61249c207a0d42fef27f830f978fa5ac9610b

    • SHA256

      d26b936b2d61001819fc4e99a224224d35edd9fd716bfe7bc5dbd431f584150e

    • SHA512

      2602f887156d9feee028f559de2ce282bf43bcbd1a008308d3e11996d5ac159d07249f5e57206ff646fbefdd2e9910558751937b33a79de7f477dfd04430c453

    • SSDEEP

      12288:l89hFSSKDgBzCddx27SuzW9KcfTAyrRQ0tqwDhp:l8bs7DgBz62BWwOAyr6tshp

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • AgentTesla payload

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks