General
-
Target
SOA.rar
-
Size
570KB
-
Sample
221003-qnx69shbfk
-
MD5
a31f4c8f062abb7f496454d9ae66c711
-
SHA1
0aaa1e268faf710e83db46b67415950e3e6e4aeb
-
SHA256
aa5814089c83a64c4736bdafe241955e4dc548618856f785ad9fb51c00538be0
-
SHA512
b837e95dad90dea0f72084b6de9a4158ef7e48f92ad8f4fe5737c21fa6e33a31970ca4990053dce49b25e59b957b9d7a6546b0312efd5cfc46e8ef7ffe29dc29
-
SSDEEP
12288:zp3tC93EXgQ3PBZEysPxARDR2x0HUG+Dbqz8creWRCnUr3mm9WpsgAp0g:t3LX5ZWAOvLmzFRCnG3ml+fug
Static task
static1
Behavioral task
behavioral1
Sample
SOA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SOA.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5662683474:AAFvSjyPXTiwhBPcFi8of3_-_FCdfhhN8x0/
Targets
-
-
Target
SOA.exe
-
Size
817KB
-
MD5
65cf9f513fe65960aefc49c2d270d924
-
SHA1
dac0a821c5b634f56af5831af625876ce6597564
-
SHA256
fcd3ba5e5f78af587c276aa85311f797b47d652dac19566d0702a5065d47c2c1
-
SHA512
c8544a2fef5cf7e42e2ea05297e0908add8408b4f73ecc87df067f4be2d0f6410ea2896215f41c933607cde279efb596789f8886ffe56564f53137f5d002c215
-
SSDEEP
12288:lsM2iNUADqjJ5nqjy2q9nqLaWs6nluh8FLVZiUoH6qBpZ/I/x:lsM1Ajr/3WvP4HlBU
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-