General
-
Target
BL copy.zip
-
Size
320KB
-
Sample
221122-lm8jdsha77
-
MD5
776e2c5ae23850e1e35b6a5987182b86
-
SHA1
09e1bdad222988a428838fbf73c4588252d10562
-
SHA256
8e6e39cf270a36e933a9d29563036afde6687360020117780c09a17127ab79af
-
SHA512
0e78470b25d1c32db7a2d9bef48a235c53ab1734e536ec5419e2e6d19140aa63eec559284b4d49b27bbb2b31d9fc9ef4af1b8b6d2fffcf111e4a499e622aff2f
-
SSDEEP
6144:Lc3V/XNQKJDd4wH/BdHZONl0ElaHqVRjT8ixM1IeFZSjohlk7N+r1LmPD4R6FMp:L0WKd9HONlWHqVRjAi2uoh8MBiD4EFE
Static task
static1
Behavioral task
behavioral1
Sample
BL copy.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
BL copy.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5663632223:AAG5KHZDs7KWoaqTYx3lSyFlOdfD9vGegQo/
Targets
-
-
Target
BL copy.exe
-
Size
478KB
-
MD5
c0ba88e93c37a5381ed30ebe13e3230d
-
SHA1
dbb6385a5acc6993e234d533b75bfc888dab8649
-
SHA256
4d32ec11bf2963e4a505853ea46c4b15b73ad0b435fd3f279d034480335901a9
-
SHA512
0c6160803d16677c7b00821dc612aea82ed6424272160d9117076227b762609bab2a22b18b1edc88c91579ef04f88877601176e70420a2ecdda63990fc1f496e
-
SSDEEP
6144:bEa0biTgOrovwH/BdHZONl0E5aHKVRjT8i1M1IeFZSjyhlk7NQr1LsPD4RtR0:YfyovWHONluHKVRjAiCuyh86BgD4l0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-