General

  • Target

    4e4facfb16dc437fb99380cbc0a47fe1c1b68960def6a235a277cdcceda157e1

  • Size

    655KB

  • Sample

    240522-bqvftsga4v

  • MD5

    f581d30c2f72ca0e9c28de7ccb8e7ca1

  • SHA1

    9f5b64f076459dc6148cf99aa1e2e0a637acbf2f

  • SHA256

    4e4facfb16dc437fb99380cbc0a47fe1c1b68960def6a235a277cdcceda157e1

  • SHA512

    150f22ed63211e111daaec8d45c9701e942bcb4e83e2caa835befbdb1c99e1623b808a1e40ad187aae5a6da57d44858136c4fda878bc721d2791e6036c443fbf

  • SSDEEP

    12288:jrHgUAeamxnXOwc/q1B1OX0fD30dZC3TrL2bnClM6XY0SMBENNHVtZ1L+usDXlQo:/g/Yewiq1LH30XmTrLiClM6X1AHVX1Lw

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6903206003:AAFF6yOZVX0NDeRB5rBj48VYNGsWBB__dvI/

Targets

    • Target

      4e4facfb16dc437fb99380cbc0a47fe1c1b68960def6a235a277cdcceda157e1

    • Size

      655KB

    • MD5

      f581d30c2f72ca0e9c28de7ccb8e7ca1

    • SHA1

      9f5b64f076459dc6148cf99aa1e2e0a637acbf2f

    • SHA256

      4e4facfb16dc437fb99380cbc0a47fe1c1b68960def6a235a277cdcceda157e1

    • SHA512

      150f22ed63211e111daaec8d45c9701e942bcb4e83e2caa835befbdb1c99e1623b808a1e40ad187aae5a6da57d44858136c4fda878bc721d2791e6036c443fbf

    • SSDEEP

      12288:jrHgUAeamxnXOwc/q1B1OX0fD30dZC3TrL2bnClM6XY0SMBENNHVtZ1L+usDXlQo:/g/Yewiq1LH30XmTrLiClM6X1AHVX1Lw

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks