General

  • Target

    Halkbank_Ekstre_20230918_073809_405251-PDF.exe

  • Size

    870KB

  • Sample

    231012-e2tkfsgh42

  • MD5

    84fc8471bb943cd772536922808494be

  • SHA1

    c05e01390eb3f59f58ecf92e68c3975197c1f1c6

  • SHA256

    fec13aa5cd5a5f883361b1192f68fe5f76da2e01437d99d767c383f5137da618

  • SHA512

    1e7c4463f89231072242cffdef68a732322884282e8ac56e8aab9887d1c65ed7e496a9f1e3b0ecc10b03ffc01c03db6643428568df4e077233794331f5343ad6

  • SSDEEP

    12288:Pm2iNNEisUH/hPBKkKHUa01o3DvwuxG/UffSaxGkHIeCRoFQUW9d+pnEcTgVOGEo:e1XEWpPBKkmQo3jwd/UfDBjQ9+ixW1q

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6315598701:AAF2CsdeWHvEuw0HSURtUQQu4FuqwvM5AOA/

Targets

    • Target

      Halkbank_Ekstre_20230918_073809_405251-PDF.exe

    • Size

      870KB

    • MD5

      84fc8471bb943cd772536922808494be

    • SHA1

      c05e01390eb3f59f58ecf92e68c3975197c1f1c6

    • SHA256

      fec13aa5cd5a5f883361b1192f68fe5f76da2e01437d99d767c383f5137da618

    • SHA512

      1e7c4463f89231072242cffdef68a732322884282e8ac56e8aab9887d1c65ed7e496a9f1e3b0ecc10b03ffc01c03db6643428568df4e077233794331f5343ad6

    • SSDEEP

      12288:Pm2iNNEisUH/hPBKkKHUa01o3DvwuxG/UffSaxGkHIeCRoFQUW9d+pnEcTgVOGEo:e1XEWpPBKkmQo3jwd/UfDBjQ9+ixW1q

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks