General

  • Target

    a34bea7d2548f026b7d5f02f486e2d87b39f58e263684b298bdbdc869a0c2630.exe

  • Size

    1.2MB

  • Sample

    241008-q7jg8atcmf

  • MD5

    6b5283e3930b0c92dc191d895e9d20ed

  • SHA1

    682acb9ce6b59f5bcc815e26525c502bc56efc5b

  • SHA256

    a34bea7d2548f026b7d5f02f486e2d87b39f58e263684b298bdbdc869a0c2630

  • SHA512

    bf92166a48f09fc1958f4ee07a15e3a00037110975f339958bdec2de6e5875cc00ff06b94552eb979ff2d143277e9f218568d4c79c224619d4837bac4e1b8e88

  • SSDEEP

    24576:1H0Hw8t4Uimln8XQwg4O6nPcwwW2n/HrEkGR7O:F0Hw8tzNB8OsfDkKy

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot7220431026:AAHszs0XzPcajloTXlLJDVKab99uNUvPaok/

Targets

    • Target

      a34bea7d2548f026b7d5f02f486e2d87b39f58e263684b298bdbdc869a0c2630.exe

    • Size

      1.2MB

    • MD5

      6b5283e3930b0c92dc191d895e9d20ed

    • SHA1

      682acb9ce6b59f5bcc815e26525c502bc56efc5b

    • SHA256

      a34bea7d2548f026b7d5f02f486e2d87b39f58e263684b298bdbdc869a0c2630

    • SHA512

      bf92166a48f09fc1958f4ee07a15e3a00037110975f339958bdec2de6e5875cc00ff06b94552eb979ff2d143277e9f218568d4c79c224619d4837bac4e1b8e88

    • SSDEEP

      24576:1H0Hw8t4Uimln8XQwg4O6nPcwwW2n/HrEkGR7O:F0Hw8tzNB8OsfDkKy

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks