General

  • Target

    5bd0a264fcd48c39d57df7dffcc8809d51e677510ee5e6847a9338793c652b45

  • Size

    710KB

  • Sample

    240327-cnw3badc5s

  • MD5

    c0d3ac3b4937048d8216aedcd7b48a03

  • SHA1

    dd67f9ee6e897bb05f3d679d858f1eb3f1390027

  • SHA256

    5bd0a264fcd48c39d57df7dffcc8809d51e677510ee5e6847a9338793c652b45

  • SHA512

    4bedeb4654525d70ec9c97bed1cad4c40a7891d20d204c3aea08e23c1e3946bca1bcbc3f73bf550281f4cd7f57eac037652366d4c976ba430116e0b6d6913e1e

  • SSDEEP

    12288:Z+QvgLt3Zz9qVgXb4bPNro681jqkpM8LBVP1dMmQDCJD/OafKUX3ErBn0688:Z2zYeXkbFckMnPXQ+rjyUaBx

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6455833672:AAEFwznYRFbwog3UBqp13FPbH7YVb236SRI/

Targets

    • Target

      5bd0a264fcd48c39d57df7dffcc8809d51e677510ee5e6847a9338793c652b45

    • Size

      710KB

    • MD5

      c0d3ac3b4937048d8216aedcd7b48a03

    • SHA1

      dd67f9ee6e897bb05f3d679d858f1eb3f1390027

    • SHA256

      5bd0a264fcd48c39d57df7dffcc8809d51e677510ee5e6847a9338793c652b45

    • SHA512

      4bedeb4654525d70ec9c97bed1cad4c40a7891d20d204c3aea08e23c1e3946bca1bcbc3f73bf550281f4cd7f57eac037652366d4c976ba430116e0b6d6913e1e

    • SSDEEP

      12288:Z+QvgLt3Zz9qVgXb4bPNro681jqkpM8LBVP1dMmQDCJD/OafKUX3ErBn0688:Z2zYeXkbFckMnPXQ+rjyUaBx

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • UAC bypass

    • Windows security bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks