General

  • Target

    cf192820368219f862180ca80c22a668d69ad244d43cbcf443a5f6633ff75528

  • Size

    3.1MB

  • Sample

    241115-cr16faxcjm

  • MD5

    cca63ff155ffa6054e2a440df2734599

  • SHA1

    b742b192503df585a5437bc19e65d48b6bf47390

  • SHA256

    cf192820368219f862180ca80c22a668d69ad244d43cbcf443a5f6633ff75528

  • SHA512

    9a36049321432101c618b1fe57b25d423dfbd712183494083734a977f99d1373eb525f55b683e0fc3f2c87c14a630abcacbc5e42e90c3de539d1f80132b74fec

  • SSDEEP

    12288:zEGtFDNnVK+c126DeGKsitlr19u8z9XIiLg6zuzJ+n0XqZzAVkCIEsjvAD:htFFVK+c1FO3lp9ZHzj0XIAPsjU

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5471298201:AAGFh758keN2eA73SQlIsmB91r4EW74GWCo/

Targets

    • Target

      cf192820368219f862180ca80c22a668d69ad244d43cbcf443a5f6633ff75528

    • Size

      3.1MB

    • MD5

      cca63ff155ffa6054e2a440df2734599

    • SHA1

      b742b192503df585a5437bc19e65d48b6bf47390

    • SHA256

      cf192820368219f862180ca80c22a668d69ad244d43cbcf443a5f6633ff75528

    • SHA512

      9a36049321432101c618b1fe57b25d423dfbd712183494083734a977f99d1373eb525f55b683e0fc3f2c87c14a630abcacbc5e42e90c3de539d1f80132b74fec

    • SSDEEP

      12288:zEGtFDNnVK+c126DeGKsitlr19u8z9XIiLg6zuzJ+n0XqZzAVkCIEsjvAD:htFFVK+c1FO3lp9ZHzj0XIAPsjU

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • UAC bypass

    • Windows security bypass

    • Looks for VirtualBox Guest Additions in registry

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Windows security modification

    • Accesses Microsoft Outlook profiles

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks