General
-
Target
496ca27f7e8427d6c14a393566ba75c0bd9d1725eaf9cca5149d8455e5c34db7
-
Size
1.1MB
-
Sample
220302-qqfd8sgfhj
-
MD5
8a454a6fe865069a359c36f6bc9da694
-
SHA1
80c8f7b3902325618a32fabcbc975a5ef72defbc
-
SHA256
496ca27f7e8427d6c14a393566ba75c0bd9d1725eaf9cca5149d8455e5c34db7
-
SHA512
85712d31099d68634cc5e0c9d519e8ffb0db68112e5b249ed0414cfac102e4c78fc16bd7c1aac9987a429b2ae77238a9291fb8b76989f43cdc5bfca1f7fd63bf
Static task
static1
Behavioral task
behavioral1
Sample
496ca27f7e8427d6c14a393566ba75c0bd9d1725eaf9cca5149d8455e5c34db7.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5276989987:AAF82wMzHIuNJUhln-W_Qu0JnglF2cbw1SM/sendDocument
Targets
-
-
Target
496ca27f7e8427d6c14a393566ba75c0bd9d1725eaf9cca5149d8455e5c34db7
-
Size
1.1MB
-
MD5
8a454a6fe865069a359c36f6bc9da694
-
SHA1
80c8f7b3902325618a32fabcbc975a5ef72defbc
-
SHA256
496ca27f7e8427d6c14a393566ba75c0bd9d1725eaf9cca5149d8455e5c34db7
-
SHA512
85712d31099d68634cc5e0c9d519e8ffb0db68112e5b249ed0414cfac102e4c78fc16bd7c1aac9987a429b2ae77238a9291fb8b76989f43cdc5bfca1f7fd63bf
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-