General
-
Target
b663557fae5b2a3ae36a386d6021faefc5c91d22229b0c8949261b4c1a8c4ee7
-
Size
706KB
-
Sample
220907-r2vhzahefq
-
MD5
c2b373e41187c0234d66c81798071343
-
SHA1
119253344e8626d575af2b89e1f0160239fbb0c0
-
SHA256
b663557fae5b2a3ae36a386d6021faefc5c91d22229b0c8949261b4c1a8c4ee7
-
SHA512
c64bbdb786e50e04ef37822bde0190d8bef91dd42f8af6f03fd8098b6e832e04cc02b375ada6f3aee72664e95842ec56d9ccfaf8b4dc3f9639665be4b8fff43b
-
SSDEEP
12288:Co1z8YRkaZXOYm6WxYx4UEXcW6w8Bj+mhmE/7in3c0++iVZqsFXvch:NsaZXOYpsYO8Bj+mhp8M0+pVZ/FX0h
Static task
static1
Behavioral task
behavioral1
Sample
b663557fae5b2a3ae36a386d6021faefc5c91d22229b0c8949261b4c1a8c4ee7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b663557fae5b2a3ae36a386d6021faefc5c91d22229b0c8949261b4c1a8c4ee7.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
http://141.98.6.75/500/inc/9bce52518beca5.php
Targets
-
-
Target
b663557fae5b2a3ae36a386d6021faefc5c91d22229b0c8949261b4c1a8c4ee7
-
Size
706KB
-
MD5
c2b373e41187c0234d66c81798071343
-
SHA1
119253344e8626d575af2b89e1f0160239fbb0c0
-
SHA256
b663557fae5b2a3ae36a386d6021faefc5c91d22229b0c8949261b4c1a8c4ee7
-
SHA512
c64bbdb786e50e04ef37822bde0190d8bef91dd42f8af6f03fd8098b6e832e04cc02b375ada6f3aee72664e95842ec56d9ccfaf8b4dc3f9639665be4b8fff43b
-
SSDEEP
12288:Co1z8YRkaZXOYm6WxYx4UEXcW6w8Bj+mhmE/7in3c0++iVZqsFXvch:NsaZXOYpsYO8Bj+mhp8M0+pVZ/FX0h
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-