General
-
Target
invoice.exe
-
Size
817KB
-
Sample
221003-qex5xaggcj
-
MD5
65cf9f513fe65960aefc49c2d270d924
-
SHA1
dac0a821c5b634f56af5831af625876ce6597564
-
SHA256
fcd3ba5e5f78af587c276aa85311f797b47d652dac19566d0702a5065d47c2c1
-
SHA512
c8544a2fef5cf7e42e2ea05297e0908add8408b4f73ecc87df067f4be2d0f6410ea2896215f41c933607cde279efb596789f8886ffe56564f53137f5d002c215
-
SSDEEP
12288:lsM2iNUADqjJ5nqjy2q9nqLaWs6nluh8FLVZiUoH6qBpZ/I/x:lsM1Ajr/3WvP4HlBU
Static task
static1
Behavioral task
behavioral1
Sample
invoice.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
invoice.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5662683474:AAFvSjyPXTiwhBPcFi8of3_-_FCdfhhN8x0/
Targets
-
-
Target
invoice.exe
-
Size
817KB
-
MD5
65cf9f513fe65960aefc49c2d270d924
-
SHA1
dac0a821c5b634f56af5831af625876ce6597564
-
SHA256
fcd3ba5e5f78af587c276aa85311f797b47d652dac19566d0702a5065d47c2c1
-
SHA512
c8544a2fef5cf7e42e2ea05297e0908add8408b4f73ecc87df067f4be2d0f6410ea2896215f41c933607cde279efb596789f8886ffe56564f53137f5d002c215
-
SSDEEP
12288:lsM2iNUADqjJ5nqjy2q9nqLaWs6nluh8FLVZiUoH6qBpZ/I/x:lsM1Ajr/3WvP4HlBU
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-