General
-
Target
d99d68d3524a5f63c63744a3ed010e3a53282c7eb92bed6c4f7800e457adffe1.exe.danger
-
Size
1.4MB
-
Sample
221020-wgjcesgce6
-
MD5
968f6a1996b35b9a7cda5ce89f5e0b59
-
SHA1
1ec96d74230ffcb5a75f8170e9872d3c41125015
-
SHA256
d99d68d3524a5f63c63744a3ed010e3a53282c7eb92bed6c4f7800e457adffe1
-
SHA512
9c04b50cd713eb9ab5f72eec3fa6a20717aad33d29462c556633b152e99cee942185760b440caf3b3f936983bbefd44eb28142167f4ee3795ae1f957c9254c90
-
SSDEEP
12288:jFEPkBofq4vbCVqHVpR2wU6RKv3zskqKgnWZQzjFeM6DJOjB9sTTHypcK0NZoz9W:4/U6RKv3zskhgnYQb6VOdlKoz9rC
Static task
static1
Behavioral task
behavioral1
Sample
d99d68d3524a5f63c63744a3ed010e3a53282c7eb92bed6c4f7800e457adffe1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d99d68d3524a5f63c63744a3ed010e3a53282c7eb92bed6c4f7800e457adffe1.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
http://195.178.120.72/3ip/inc/523ecb38582a9c.php
Targets
-
-
Target
d99d68d3524a5f63c63744a3ed010e3a53282c7eb92bed6c4f7800e457adffe1.exe.danger
-
Size
1.4MB
-
MD5
968f6a1996b35b9a7cda5ce89f5e0b59
-
SHA1
1ec96d74230ffcb5a75f8170e9872d3c41125015
-
SHA256
d99d68d3524a5f63c63744a3ed010e3a53282c7eb92bed6c4f7800e457adffe1
-
SHA512
9c04b50cd713eb9ab5f72eec3fa6a20717aad33d29462c556633b152e99cee942185760b440caf3b3f936983bbefd44eb28142167f4ee3795ae1f957c9254c90
-
SSDEEP
12288:jFEPkBofq4vbCVqHVpR2wU6RKv3zskqKgnWZQzjFeM6DJOjB9sTTHypcK0NZoz9W:4/U6RKv3zskhgnYQb6VOdlKoz9rC
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-