General

  • Target

    8d52ad531a5b78fdb0795a14f972923a14f494f13531da24cff68c9446d80dfa.exe

  • Size

    775KB

  • Sample

    240306-cykf9saa39

  • MD5

    8d2cc9fab6c3a813a7b0ca4bb9e1f646

  • SHA1

    b70991897fc5f7b57caf2fcb2deb5609fe464cb6

  • SHA256

    8d52ad531a5b78fdb0795a14f972923a14f494f13531da24cff68c9446d80dfa

  • SHA512

    bd4daf5284cfbebcf0d994e750df2315a9bd68511e76fa5b2ee588134b1a407662db69064377eef4bc8355a0f23daeb6c5c624a43298e3e2c1edd3260b73b149

  • SSDEEP

    12288:RRgq/mUE7dvoKu0q2mJthcCjdQVnqUQ6cbVkASdhsgy2KU5iqV9Yu:RRgsYdvoKjq8CjXDfRkASdfyAiOY

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6770768679:AAGEmH6O_SdrlBhWJKpNn8TBf_eUXBt3ADo/

Targets

    • Target

      8d52ad531a5b78fdb0795a14f972923a14f494f13531da24cff68c9446d80dfa.exe

    • Size

      775KB

    • MD5

      8d2cc9fab6c3a813a7b0ca4bb9e1f646

    • SHA1

      b70991897fc5f7b57caf2fcb2deb5609fe464cb6

    • SHA256

      8d52ad531a5b78fdb0795a14f972923a14f494f13531da24cff68c9446d80dfa

    • SHA512

      bd4daf5284cfbebcf0d994e750df2315a9bd68511e76fa5b2ee588134b1a407662db69064377eef4bc8355a0f23daeb6c5c624a43298e3e2c1edd3260b73b149

    • SSDEEP

      12288:RRgq/mUE7dvoKu0q2mJthcCjdQVnqUQ6cbVkASdhsgy2KU5iqV9Yu:RRgsYdvoKjq8CjXDfRkASdfyAiOY

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks