General

  • Target

    tmp.bin

  • Size

    1.1MB

  • Sample

    240606-chrkmsfd34

  • MD5

    e49021349421da83e2b41ffab9bd734e

  • SHA1

    7d809ef36d2098a06ef26ead37487fadd1820077

  • SHA256

    e21c44103f87b61c22c29d59719df1bbc4a49e16137698e694c250c37e8e8800

  • SHA512

    67441eb4b32ac86be752af0c0ba32b5337cda67287ecd9805d8df70034e05495127978b29d8322305b69284d8360a2194281663901f80a00885030893d915374

  • SSDEEP

    24576:wAHnh+eWsN3skA4RV1Hom2KXMmHaXExQu/4wf7oUn5:nh+ZkldoPK8YaXE7/5fMA

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5786264459:AAFiRqFtUxpuUuFFLRisUX4PeZ4dtd8Y-8A/

Targets

    • Target

      tmp.bin

    • Size

      1.1MB

    • MD5

      e49021349421da83e2b41ffab9bd734e

    • SHA1

      7d809ef36d2098a06ef26ead37487fadd1820077

    • SHA256

      e21c44103f87b61c22c29d59719df1bbc4a49e16137698e694c250c37e8e8800

    • SHA512

      67441eb4b32ac86be752af0c0ba32b5337cda67287ecd9805d8df70034e05495127978b29d8322305b69284d8360a2194281663901f80a00885030893d915374

    • SSDEEP

      24576:wAHnh+eWsN3skA4RV1Hom2KXMmHaXExQu/4wf7oUn5:nh+ZkldoPK8YaXE7/5fMA

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks