General

  • Target

    485518fe4eb558d35ea8ea04af66331e87838e0cb0604df0ec54fab4305be4a7

  • Size

    163KB

  • Sample

    240521-b3f4zaed9w

  • MD5

    e48c329a00310865d6337bc19f995b9a

  • SHA1

    c2da3bc0632c6fa19e5658e9128a6731a1facef1

  • SHA256

    485518fe4eb558d35ea8ea04af66331e87838e0cb0604df0ec54fab4305be4a7

  • SHA512

    4d4b3a5447b77771334612afb9d3e5fc03d75c689b759bafa03160690cad3c128ce5a4e4f9f9e719d5e8f7022007e3fe18f79989ea39ffc425a60c39cba27a95

  • SSDEEP

    3072:ZzFOw3GFvSmlpvSkNTfKr1foePOvFgUiDlQaZPsP:ivS2ZMpZ0P

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6943264474:AAEBBaFIvEVQEKoHhCOHg0isUZ66U7hLvTk/

Targets

    • Target

      485518fe4eb558d35ea8ea04af66331e87838e0cb0604df0ec54fab4305be4a7

    • Size

      163KB

    • MD5

      e48c329a00310865d6337bc19f995b9a

    • SHA1

      c2da3bc0632c6fa19e5658e9128a6731a1facef1

    • SHA256

      485518fe4eb558d35ea8ea04af66331e87838e0cb0604df0ec54fab4305be4a7

    • SHA512

      4d4b3a5447b77771334612afb9d3e5fc03d75c689b759bafa03160690cad3c128ce5a4e4f9f9e719d5e8f7022007e3fe18f79989ea39ffc425a60c39cba27a95

    • SSDEEP

      3072:ZzFOw3GFvSmlpvSkNTfKr1foePOvFgUiDlQaZPsP:ivS2ZMpZ0P

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks