General

  • Target

    12533b424fc0e2699ee631f70f90c53a

  • Size

    371KB

  • Sample

    231230-jfxgfaccdj

  • MD5

    12533b424fc0e2699ee631f70f90c53a

  • SHA1

    af8bdea7faee3089d42ce253a9459795ee8cf6b1

  • SHA256

    4a1040f8742a36f31cf465ff3a17e462fae631f2f87dcf40bdbb1f59d439b0fa

  • SHA512

    87bd58328d8d39c02ce421bbf07842bc9c04199c5958e5aadab444436cc78790fb043370157e0c841a2fff99c2b015b59ee367c8a141f1aaf2b4e3a8e809d404

  • SSDEEP

    6144:So6wE99mkHuNYXYeDAxstB2WKvD62uiOYIfBbXSm7ezQHRUqiX+NW0e9S+:UCkONYodutB2hDUiqBbXBBxbiONWbS+

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot1441818786:AAEjowjV33jxZfRAQA1ZhCfa4hQu3m4RGtc/sendDocument

Targets

    • Target

      brosz.exe

    • Size

      397KB

    • MD5

      0d551f659a58ebf82061d90352261973

    • SHA1

      df57f5e2a64fb64053295f0667522e24301d9b90

    • SHA256

      b339f9f5d019aa3d928055bbc35d827af151b0dfd31ca23d8cc6d3344fa0300d

    • SHA512

      5624b0fde3ed7708c575f0620d749907d6a0f3fadf34e2df720c225bf56ecae8ed9be1a8106cf7ab38d673af1d52ce3cea9be44cbb741a6520d861e83a93e66d

    • SSDEEP

      12288:brf0P3HD5YV3Y/u+TN0iSqYBCnNKCGaIGV:0P3H1YVQx57iEKuIO

MITRE ATT&CK Enterprise v15

Tasks