General

  • Target

    08102024_1557_07102024_demekopyas.pdf.lzh

  • Size

    449KB

  • Sample

    241008-thbmvsxfqd

  • MD5

    1a45c595585575d4449d876545ea00d4

  • SHA1

    a3377beb563e75b32b730e353b825972ec593086

  • SHA256

    db84ecf28cf9c25af8f91b5e442b61ad9499cebb0327fd9b9c7a015c5c15b9e9

  • SHA512

    471a19e46e06e3e7b69af94dab44ff8a0420ec953cf83aca48cdb050c4af1e37cfcdf64fc6720880a56a69bc6b84a16081df9a7e790b480863f0b4178d79d045

  • SSDEEP

    12288:YoNlFNIMvUB4q1Suw9NdELCpXMPbHjfGGnU:YoN7N+H1tegbPPfGGnU

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot7162202130:AAHTxdkbyFCUMWCzyf9jutDYYrL6rqEAva4/

Targets

    • Target

      Ödeme kopyası.pdf.exe

    • Size

      1.4MB

    • MD5

      cb9df2754f620ea0739b3dd1e3e3422f

    • SHA1

      579286334ac2305fe6fd5419e7b046d96e463033

    • SHA256

      e6b72ddd31a53809013959c4d33297e28d76c73dfa9fad878f8bd64d69bae0b2

    • SHA512

      9b70944f5327c06286e4231be84c7259dd92dcfc528bb8b31eb23587adba0d7ce67e6435f93ca7c39f6093f3f26e98288ef1c3cc80608ef5873acf433cceb9de

    • SSDEEP

      24576:j1eTYAK4egHCAjifn/Na5OMiEX6/QgcixPMRNglNq7:5e/K4IAgcix4NgTq7

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks