General

  • Target

    Ödeme Bildirimi (3).tgz

  • Size

    1.4MB

  • Sample

    240829-mqqnesyhkq

  • MD5

    ac8361126c13b4ea390c036af33e23e0

  • SHA1

    0432aa5897b2e326911f07c58b8b471cfaa5e47d

  • SHA256

    63c6b7ec130ac5a74ae3c2067bcb5024c255462a6b00d2853859159c8b0c1d0c

  • SHA512

    d9867c19d175b54921ce427639ee61b8568c7bba6cfc9ba489162b3e63d8484c722b78c000a16c62333146c94be3d7bf1c6ce332b53fa8f199d9ea25cc7cd5a1

  • SSDEEP

    12288:yJPTycOkS2xSqWfUTMErNMv1vDfXcM1+ltQJcOKvRnwLbl4YGVw:STyfRqrDMv1vsltQebOG3e

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot7041378796:AAE8c59sEoGb66PY7RqWPkvx-1dUpu0RsHs/

Targets

    • Target

      Ödeme Bildirimi.exe

    • Size

      810.6MB

    • MD5

      a3f700514749f369f3507fdfa6bb3c65

    • SHA1

      293d04cbbe7ad6ca487fcfd636d6958d56ef600c

    • SHA256

      28786549dcee2c3cf67854e1101ffbd507b2223d8ae2dffa5a2590362e758e82

    • SHA512

      299b1213126f2e0862d1d952ebcf24a8bf268364acf68524ae468694fe15bfe133d37a237b44a9da7b16387d98eb1023a534c2333122d0bc011a8042e67cddc5

    • SSDEEP

      12288:hVVywOkU2xS62NUFME/fMv1vHXpcMh+RjQVcsavRrCLhlg202U3CC:9ywGR6DbMv1vyRjQKr4k1f3C

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks