General
-
Target
Bank details.exe
-
Size
1.1MB
-
Sample
221101-la1ysabbcl
-
MD5
47926d4e06f1a28fc1f9bab98f08f310
-
SHA1
305b7a6b0a651d7fc5d7e55ac621dec73c94faeb
-
SHA256
544729c2c37dd49338122b59cf3762f6aedff5a24e26dd5591502d0fb69a31ee
-
SHA512
2ee7c8902df181768c0c06ac2ecc9b8fa8904fd3267618421fc380385ec95234ed1f572962924ab258b62c4adc0c42573dd6f57494d12493b9a2dd6c4d4645f8
-
SSDEEP
12288:uE0K1AgHtDg5xE1a6CF9SY3oarA5/DJiIb5iwLwoxlDrcSsLhv1jMyvrSvBKah5D:xnT4d/Fr3oQID0q52crcSsFdYFvBKw5
Static task
static1
Behavioral task
behavioral1
Sample
Bank details.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Bank details.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
Bank details.exe
-
Size
1.1MB
-
MD5
47926d4e06f1a28fc1f9bab98f08f310
-
SHA1
305b7a6b0a651d7fc5d7e55ac621dec73c94faeb
-
SHA256
544729c2c37dd49338122b59cf3762f6aedff5a24e26dd5591502d0fb69a31ee
-
SHA512
2ee7c8902df181768c0c06ac2ecc9b8fa8904fd3267618421fc380385ec95234ed1f572962924ab258b62c4adc0c42573dd6f57494d12493b9a2dd6c4d4645f8
-
SSDEEP
12288:uE0K1AgHtDg5xE1a6CF9SY3oarA5/DJiIb5iwLwoxlDrcSsLhv1jMyvrSvBKah5D:xnT4d/Fr3oQID0q52crcSsFdYFvBKw5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-