General

  • Target

    E-DEKONT1,DOC.exe

  • Size

    194KB

  • Sample

    230919-hjl97shd55

  • MD5

    bb9bfe851fa3a66ae88c80bab724106b

  • SHA1

    ae7636896254dd396c1bf67ad753eb90bef55d12

  • SHA256

    3138dcc632d9ad63fe372fa108ee0c1cc73d2cf79da3bf051a57f7ffc5abab37

  • SHA512

    9b83f444d90bed165886746c8655e53e61a93a4765607e704d17ff45be5a5215395edb201bcdfa584718d3367bfcd89ff41ea9759098fbb6b78841bd9a491e9e

  • SSDEEP

    3072:wDKW1LgppLRHMY0TBfJvjcTp5XTczgCVEfxvPXj5:wDKW1Lgbdl0TBBvjc/nC6vj5

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1153539462454853703/uBqITIGCHxh487IDtEi05_T0CVFY7MPJ28kszIkbpskJK5Vlm6XKFG1spM2XKrJU3dsq

Targets

    • Target

      E-DEKONT1,DOC.exe

    • Size

      194KB

    • MD5

      bb9bfe851fa3a66ae88c80bab724106b

    • SHA1

      ae7636896254dd396c1bf67ad753eb90bef55d12

    • SHA256

      3138dcc632d9ad63fe372fa108ee0c1cc73d2cf79da3bf051a57f7ffc5abab37

    • SHA512

      9b83f444d90bed165886746c8655e53e61a93a4765607e704d17ff45be5a5215395edb201bcdfa584718d3367bfcd89ff41ea9759098fbb6b78841bd9a491e9e

    • SSDEEP

      3072:wDKW1LgppLRHMY0TBfJvjcTp5XTczgCVEfxvPXj5:wDKW1Lgbdl0TBBvjc/nC6vj5

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Collection

Email Collection

1
T1114

Tasks