General

  • Target

    ae7841e1d3ca24213e0678d7dd2db51579834a62fec83c315dd463da4f5a5c13

  • Size

    3.9MB

  • Sample

    231226-bpph7aaadr

  • MD5

    3d018d14d07b7c9635c209eb0543cab8

  • SHA1

    e5042c81a8582ba177895ba049a90b60800e2297

  • SHA256

    ae7841e1d3ca24213e0678d7dd2db51579834a62fec83c315dd463da4f5a5c13

  • SHA512

    6d6ea642206f2fafaabf3f8a7165aa5bd22e77722fe0730f28d61c0d13d44b03a02df12aa1fec4e2cb29a6fc3c36754e6c052aee502b197fb680329b891598a5

  • SSDEEP

    49152:9eA3k5ul6MhfuPQoCGUiKxdszvdAQgFPhEyzYKsG6sVet39OO1:f6kAz9GMr

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6603930847:AAFEPpt87jNrswsoxRziEquzc7QyaetKssE/

Targets

    • Target

      ae7841e1d3ca24213e0678d7dd2db51579834a62fec83c315dd463da4f5a5c13

    • Size

      3.9MB

    • MD5

      3d018d14d07b7c9635c209eb0543cab8

    • SHA1

      e5042c81a8582ba177895ba049a90b60800e2297

    • SHA256

      ae7841e1d3ca24213e0678d7dd2db51579834a62fec83c315dd463da4f5a5c13

    • SHA512

      6d6ea642206f2fafaabf3f8a7165aa5bd22e77722fe0730f28d61c0d13d44b03a02df12aa1fec4e2cb29a6fc3c36754e6c052aee502b197fb680329b891598a5

    • SSDEEP

      49152:9eA3k5ul6MhfuPQoCGUiKxdszvdAQgFPhEyzYKsG6sVet39OO1:f6kAz9GMr

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks