General
-
Target
051293df4e318fa67f3075d0a258283885b1c8cf04a32d028de131903d049e97
-
Size
723KB
-
Sample
240328-b4waaaad79
-
MD5
27f2073815cbd3a3cf5f398f91d8a681
-
SHA1
c2ee2f719d3669758321b8f173e6fb90a70cd939
-
SHA256
051293df4e318fa67f3075d0a258283885b1c8cf04a32d028de131903d049e97
-
SHA512
7380f0dd668528ecc65d84bdd8f6375210fa0ed7ea726da1e5f48c5322c66d9c67e69a45d72db74a01a3eeb9908c0ed88fe0efbe80553b77b33f95207580a2b9
-
SSDEEP
12288:HCpiAa5WQTcmVJUp4WKiZh8ea0cklBo/pLD4UhO+:ipiAtHZy+Bo/N4O
Static task
static1
Behavioral task
behavioral1
Sample
051293df4e318fa67f3075d0a258283885b1c8cf04a32d028de131903d049e97.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
051293df4e318fa67f3075d0a258283885b1c8cf04a32d028de131903d049e97.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6199620468:AAFwa9UqxhltZEilbb7Spqja5qgYWeoM_is/
Targets
-
-
Target
051293df4e318fa67f3075d0a258283885b1c8cf04a32d028de131903d049e97
-
Size
723KB
-
MD5
27f2073815cbd3a3cf5f398f91d8a681
-
SHA1
c2ee2f719d3669758321b8f173e6fb90a70cd939
-
SHA256
051293df4e318fa67f3075d0a258283885b1c8cf04a32d028de131903d049e97
-
SHA512
7380f0dd668528ecc65d84bdd8f6375210fa0ed7ea726da1e5f48c5322c66d9c67e69a45d72db74a01a3eeb9908c0ed88fe0efbe80553b77b33f95207580a2b9
-
SSDEEP
12288:HCpiAa5WQTcmVJUp4WKiZh8ea0cklBo/pLD4UhO+:ipiAtHZy+Bo/N4O
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1