General

  • Target

    ZiraatBankasiSwiftMesaji11052023.exe

  • Size

    204KB

  • Sample

    230511-xvcx8sab46

  • MD5

    05cb87f20bf45c0fe50d44b760bda8c5

  • SHA1

    0b929157912bd110d4371d7ad23f033e7ad4dcd5

  • SHA256

    b34061090a7feced2f241fc001825ad1e47314b30a09bc6debabc962d7e32375

  • SHA512

    abbe8de758f129a0048f2b3c3e3cceccc0216005ed8512a816316544fff281fdd14b929164b81ef8e22503229cd209a623f375c11d3588eef4772ba85e5c1367

  • SSDEEP

    3072:2GoKPc8b4QK/OuODduhJ8AYZT/RyIexLCWUIsfk4Lavi+JKxFwoB7fxvXX4:2GoKE3OXDdkmZFWxHUxk4mlK9n4

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6203672982:AAHFrf1mnh7CzXN1-UazFFMw-1n09O8a1v0/

Targets

    • Target

      ZiraatBankasiSwiftMesaji11052023.exe

    • Size

      204KB

    • MD5

      05cb87f20bf45c0fe50d44b760bda8c5

    • SHA1

      0b929157912bd110d4371d7ad23f033e7ad4dcd5

    • SHA256

      b34061090a7feced2f241fc001825ad1e47314b30a09bc6debabc962d7e32375

    • SHA512

      abbe8de758f129a0048f2b3c3e3cceccc0216005ed8512a816316544fff281fdd14b929164b81ef8e22503229cd209a623f375c11d3588eef4772ba85e5c1367

    • SSDEEP

      3072:2GoKPc8b4QK/OuODduhJ8AYZT/RyIexLCWUIsfk4Lavi+JKxFwoB7fxvXX4:2GoKE3OXDdkmZFWxHUxk4mlK9n4

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks