General

  • Target

    d54fdb5d73a15239d0d6f187dbf737cb1f5efa584c92b37d1ad64b8e076045c7.exe

  • Size

    1.1MB

  • Sample

    240509-p3gx6adc33

  • MD5

    9270383983cd04e811a7caa8a4ee5f5b

  • SHA1

    97412ef26cbd4745b15d6e41dba416103fc98924

  • SHA256

    d54fdb5d73a15239d0d6f187dbf737cb1f5efa584c92b37d1ad64b8e076045c7

  • SHA512

    e806337642a270962193c535ca8f463bab2bb711576dde877039798ee20952d96df0c6d42c6d51e71ace83375c17e3fcd5eb83587651ec9cbf4b5b48278a39a1

  • SSDEEP

    24576:OqDEvCTbMWu7rQYlBQcBiT6rprG8asC6NRh:OTvC/MTQYxsWR7asJP

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6698844298:AAF9oR0Jf7k4zXD2nMFwUYBsEQgGIs_Be9c/

Targets

    • Target

      d54fdb5d73a15239d0d6f187dbf737cb1f5efa584c92b37d1ad64b8e076045c7.exe

    • Size

      1.1MB

    • MD5

      9270383983cd04e811a7caa8a4ee5f5b

    • SHA1

      97412ef26cbd4745b15d6e41dba416103fc98924

    • SHA256

      d54fdb5d73a15239d0d6f187dbf737cb1f5efa584c92b37d1ad64b8e076045c7

    • SHA512

      e806337642a270962193c535ca8f463bab2bb711576dde877039798ee20952d96df0c6d42c6d51e71ace83375c17e3fcd5eb83587651ec9cbf4b5b48278a39a1

    • SSDEEP

      24576:OqDEvCTbMWu7rQYlBQcBiT6rprG8asC6NRh:OTvC/MTQYxsWR7asJP

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks