General

  • Target

    e0ed9ae4533a2a960d0015130b0265f6f93f437c63abaa6a0bb974a5d1cb4b69.jar

  • Size

    372KB

  • Sample

    240517-cf8q5scf38

  • MD5

    c161c3cee8b281c3c6019aa13b4653ae

  • SHA1

    62a04e9351c8ccf57bd6dee365f8c1059e56bc6e

  • SHA256

    e0ed9ae4533a2a960d0015130b0265f6f93f437c63abaa6a0bb974a5d1cb4b69

  • SHA512

    143cfec723849c7edd7e9ad57be8ee67b5d9a6b815a169c6c8daeb642e5d0b63925d4a1ce76925050bf7ac0f4f8afd36e6c790a2b05e1a50df1cb9f1f0d2e1d8

  • SSDEEP

    6144:xerlMyR7NAdpBNQZBMgEJvZoIhxEL+bBeUyCzV/1b8+ryclllGQqdeg3Lw4:oqyhNoHQQJxBXlbBe0zV/1btvkJ0g3X

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6921829812:AAEnJSJNfX1IyXT3BfHBFaRrW9XkEjVZMFs/

Targets

    • Target

      Order Inquiry for new Purchase_pdf.exe

    • Size

      947KB

    • MD5

      12a0d4a27fb7f7d5f1b345c9e6b171e2

    • SHA1

      6c6c01b4d9023e2f77ea6758b935c656637e5ea2

    • SHA256

      fc44d6c0bc3f20d6e311cbc63e3442fb7f31b2edf039e49ce424549eddfa522d

    • SHA512

      1916f25fd5dca34c3c92c97a0a5ccd9663d1bdce3d00ee23fd5c1dcdc91784fcdba8fb4857c0478f95920f0c9bbe9e422effa2163e724af4343f6c7ae6dd4418

    • SSDEEP

      24576:OeqkD+B877zBtMA0yZqv+D09Pxjlahm8QIPntPG1kYWAXPJ:OeX+xjz8HzYW

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables packed with 9Rays.Net Spices.Net Obfuscator.

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks