General

  • Target

    Halkbank_Ekstre_20230614_073809_405251-PDF.exe

  • Size

    889KB

  • Sample

    230616-nevnnsed5w

  • MD5

    f5ed6d70b2c05c5b9beb673c250df3a4

  • SHA1

    3371c16c53377acce7865d1373ddbe6f37476a0a

  • SHA256

    14480f4ce9a1c99ea2336e2d28ccd37aac77275f8adde88ef001318b45a644b7

  • SHA512

    e130396f46888f2761135e720ef540baa8878497b18a6af52d93f81b7b61324f49d41c018c322139b1f934695fed775617e99dac96eec54dc553eeae55ebda1d

  • SSDEEP

    12288:r5LbzIu9+r9N6VCIbtDN9u22xrSuO9RlhigU:r5LA9xMYL0P9rh/

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5817723059:AAHLBu2CaRbhv8Vp2UNvh8S3DM3a6i7mZsk/

Targets

    • Target

      Halkbank_Ekstre_20230614_073809_405251-PDF.exe

    • Size

      889KB

    • MD5

      f5ed6d70b2c05c5b9beb673c250df3a4

    • SHA1

      3371c16c53377acce7865d1373ddbe6f37476a0a

    • SHA256

      14480f4ce9a1c99ea2336e2d28ccd37aac77275f8adde88ef001318b45a644b7

    • SHA512

      e130396f46888f2761135e720ef540baa8878497b18a6af52d93f81b7b61324f49d41c018c322139b1f934695fed775617e99dac96eec54dc553eeae55ebda1d

    • SSDEEP

      12288:r5LbzIu9+r9N6VCIbtDN9u22xrSuO9RlhigU:r5LA9xMYL0P9rh/

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks