General
-
Target
XBH2wJXWhhezh1n.exe
-
Size
1.0MB
-
Sample
221122-r1v34sba9w
-
MD5
895ebaf32f2cf5f84f9cfecf203c9d33
-
SHA1
2aaccc31c06a2b025b6cf755c6bae0a385568398
-
SHA256
2980f607058a2ba908559bdedbbd019edd4b52377e5f884d36a62bf9aac8be00
-
SHA512
6475d02fee2b7721973383ff19ae8f1f085de1c11cab453110678af35cf8ebf58e014e42190e3d778f20b8d9875c451ad9ca323ed4f1e261cf81f7d9f2f60334
-
SSDEEP
24576:I1u5qdO0LY5A23/vuY0l+2qSf/DEeA+ZeCK:IoqdO0m9T9C/7Ze
Static task
static1
Behavioral task
behavioral1
Sample
XBH2wJXWhhezh1n.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
XBH2wJXWhhezh1n.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5453942321:AAF6CS9julQ6K7s5pxacNALwWJ2A52D0EC4/
Targets
-
-
Target
XBH2wJXWhhezh1n.exe
-
Size
1.0MB
-
MD5
895ebaf32f2cf5f84f9cfecf203c9d33
-
SHA1
2aaccc31c06a2b025b6cf755c6bae0a385568398
-
SHA256
2980f607058a2ba908559bdedbbd019edd4b52377e5f884d36a62bf9aac8be00
-
SHA512
6475d02fee2b7721973383ff19ae8f1f085de1c11cab453110678af35cf8ebf58e014e42190e3d778f20b8d9875c451ad9ca323ed4f1e261cf81f7d9f2f60334
-
SSDEEP
24576:I1u5qdO0LY5A23/vuY0l+2qSf/DEeA+ZeCK:IoqdO0m9T9C/7Ze
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-