General

  • Target

    e-dekont_html.exe

  • Size

    652KB

  • Sample

    230516-massvaah3y

  • MD5

    cde7c1f79b8159ab607119c438fe119f

  • SHA1

    435013ae5ba8fc9ee9948255b537512f0c9ba6b2

  • SHA256

    ed4b9afcb717295f5fb71bcc6f408dbbed12c6858ee2f20a1f7bd2ab72074fc6

  • SHA512

    f5d68ac386c6f1eb822a5bbea62c71e9c1345693ddf8971809f592e6544066eca552e57a642cc194b3e1181272d9107b62927b6ffe3311ce3de4646e63145031

  • SSDEEP

    12288:BY6v5DlZnhAkWsPpibPmLq5iKtwI17fZxtmkII5S5//kQfj6FiwyPA:/hHnqkWcpEmLcth1LZx2US/M0mFPsA

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5322219147:AAE0Z9Lq-g-SXI1X2beYR26iGFyieqMa3DE/sendDocument

Targets

    • Target

      e-dekont_html.exe

    • Size

      652KB

    • MD5

      cde7c1f79b8159ab607119c438fe119f

    • SHA1

      435013ae5ba8fc9ee9948255b537512f0c9ba6b2

    • SHA256

      ed4b9afcb717295f5fb71bcc6f408dbbed12c6858ee2f20a1f7bd2ab72074fc6

    • SHA512

      f5d68ac386c6f1eb822a5bbea62c71e9c1345693ddf8971809f592e6544066eca552e57a642cc194b3e1181272d9107b62927b6ffe3311ce3de4646e63145031

    • SSDEEP

      12288:BY6v5DlZnhAkWsPpibPmLq5iKtwI17fZxtmkII5S5//kQfj6FiwyPA:/hHnqkWcpEmLcth1LZx2US/M0mFPsA

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks