General
-
Target
invoice.rar
-
Size
570KB
-
Sample
221003-qex5xaggbr
-
MD5
55167cdf6f9a8820f323ffe8707a62fe
-
SHA1
6535c758134dc5c503479dd855e6a3a720d74f1f
-
SHA256
2856c52222de6d572f627ef9b98f0b20424c7979e6310ab6d02eb2cc9efb310b
-
SHA512
80ba17541ed577f9340e06a2ea1320ddc3273c7457d8bde4c5ed3398c8bc5ce7e0af3cd115ae6d141241052d99414f28d71ae08ea790e018fb6ccb0a07a556e7
-
SSDEEP
12288:bp3tC93EXgQ3PBZEysPxARDR2x0HUG+Dbqz8creWRCnUr3mm9WpsgAp0a:l3LX5ZWAOvLmzFRCnG3ml+fua
Static task
static1
Behavioral task
behavioral1
Sample
invoice.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
invoice.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5662683474:AAFvSjyPXTiwhBPcFi8of3_-_FCdfhhN8x0/
Targets
-
-
Target
invoice.exe
-
Size
817KB
-
MD5
65cf9f513fe65960aefc49c2d270d924
-
SHA1
dac0a821c5b634f56af5831af625876ce6597564
-
SHA256
fcd3ba5e5f78af587c276aa85311f797b47d652dac19566d0702a5065d47c2c1
-
SHA512
c8544a2fef5cf7e42e2ea05297e0908add8408b4f73ecc87df067f4be2d0f6410ea2896215f41c933607cde279efb596789f8886ffe56564f53137f5d002c215
-
SSDEEP
12288:lsM2iNUADqjJ5nqjy2q9nqLaWs6nluh8FLVZiUoH6qBpZ/I/x:lsM1Ajr/3WvP4HlBU
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-