General

  • Target

    2b438a5f6c0d8a371a194fdb7c57511862fa8569b439a75c8028ef30bbac58d8

  • Size

    936KB

  • Sample

    240521-bxna4aec3x

  • MD5

    12f0984001a496b1b0ffc2a194c941a3

  • SHA1

    f5be29bdbae4decdb20a60f324fbb9dd3d0934ef

  • SHA256

    2b438a5f6c0d8a371a194fdb7c57511862fa8569b439a75c8028ef30bbac58d8

  • SHA512

    b6e83213b59c8e499b8cb97ed75de224b323bbebe8559eb6d6c0d22fc8deef57d76c4a84878e895859260cc605ace2f341faa0b82bc9f4e7ac42c7277b45ed27

  • SSDEEP

    12288:WLwnvLhvEKk5t0QQMl/Dgoc0K3+XTsJ9AsPhS7xeQfpcv6606VbqmI:WLEv1EKk5t1g/DYEAsPs7xe40qm

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6602115092:AAE_EkIum3mOHF88T9ufYt_oJr5nE8bFoJA/

Targets

    • Target

      2b438a5f6c0d8a371a194fdb7c57511862fa8569b439a75c8028ef30bbac58d8

    • Size

      936KB

    • MD5

      12f0984001a496b1b0ffc2a194c941a3

    • SHA1

      f5be29bdbae4decdb20a60f324fbb9dd3d0934ef

    • SHA256

      2b438a5f6c0d8a371a194fdb7c57511862fa8569b439a75c8028ef30bbac58d8

    • SHA512

      b6e83213b59c8e499b8cb97ed75de224b323bbebe8559eb6d6c0d22fc8deef57d76c4a84878e895859260cc605ace2f341faa0b82bc9f4e7ac42c7277b45ed27

    • SSDEEP

      12288:WLwnvLhvEKk5t0QQMl/Dgoc0K3+XTsJ9AsPhS7xeQfpcv6606VbqmI:WLEv1EKk5t1g/DYEAsPs7xe40qm

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks