General

  • Target

    af5e42f54bbd7bf148b0f6fc1ac27b24c35f8012c3ef7e325de95a8c03bb6200

  • Size

    680KB

  • Sample

    240328-bjzrzaab34

  • MD5

    4b3f6221ed34fb691f8ae67ac12f130e

  • SHA1

    73617fbb7b533ffb4ad12010c6e06192254b53f5

  • SHA256

    af5e42f54bbd7bf148b0f6fc1ac27b24c35f8012c3ef7e325de95a8c03bb6200

  • SHA512

    f308573abba922e3123f18128f891fb69a1e51ad98d3da6346f71a776dd61362f1f340ffecf1c06a5895ca0f37d7a5e9193fc82c59e74c2f4ec4e6bf4befe5ce

  • SSDEEP

    12288:g4gD4NS8vlf8iezp5fXixBPKjD7ScFPD8aoVZ+5cxdL83lQ/iCPBuM+J:uD4S8vlf8NzXivyrZQaozPbi8I

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot7131275962:AAE-dJRIntufGLICZWLXrTBpxMw_24XDbCc/

Targets

    • Target

      af5e42f54bbd7bf148b0f6fc1ac27b24c35f8012c3ef7e325de95a8c03bb6200

    • Size

      680KB

    • MD5

      4b3f6221ed34fb691f8ae67ac12f130e

    • SHA1

      73617fbb7b533ffb4ad12010c6e06192254b53f5

    • SHA256

      af5e42f54bbd7bf148b0f6fc1ac27b24c35f8012c3ef7e325de95a8c03bb6200

    • SHA512

      f308573abba922e3123f18128f891fb69a1e51ad98d3da6346f71a776dd61362f1f340ffecf1c06a5895ca0f37d7a5e9193fc82c59e74c2f4ec4e6bf4befe5ce

    • SSDEEP

      12288:g4gD4NS8vlf8iezp5fXixBPKjD7ScFPD8aoVZ+5cxdL83lQ/iCPBuM+J:uD4S8vlf8NzXivyrZQaozPbi8I

MITRE ATT&CK Matrix ATT&CK v13

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Defense Evasion

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

3
T1562

Disable or Modify Tools

3
T1562.001

Modify Registry

4
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Tasks