General
-
Target
EF25E5A164BA8A60440216EEE9BF9A9A9E876307F3F38B4E9E3EAE64015040F9
-
Size
548KB
-
Sample
221123-r211radb8s
-
MD5
1512e7f89bc2b58e7f78479a988ff19c
-
SHA1
07d8ce1c68d08139e756bb9ef53020e4cc65c475
-
SHA256
ef25e5a164ba8a60440216eee9bf9a9a9e876307f3f38b4e9e3eae64015040f9
-
SHA512
02d1b1e680620e9481ac41c80bd6a0cacc5026c548d74ff221ad1c4cadb75f328fa601dcae58371c740edfa02a48e5e625d3c4ed93e2cffd6a0c531887a2151c
-
SSDEEP
12288:syuyJmaEZ+WbxGt+rXUepzP8AFasdsQ02KNm7KPBJ6Gws+kjpffmI:s/C37OxW+rPF/sJNVJ6Bs/z
Static task
static1
Behavioral task
behavioral1
Sample
bank copy.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bank copy.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.biateknos.com - Port:
587 - Username:
[email protected] - Password:
biateknossutinah - Email To:
[email protected]
Targets
-
-
Target
bank copy.exe
-
Size
719KB
-
MD5
ff4026a77a99a313617c3c340d3df719
-
SHA1
bcc53aa8607277724e62361991b0be371f074ca9
-
SHA256
642313658b6a4952937dedb17038b00228c6ccfe6f8c4c4f478c7319e6071973
-
SHA512
aa8f9231377f98772b8ebedfc88f2864ceca2c1fa2fae883404672afa97fcc8cae7da7f00e8a6ca6fc8cb1d0ec609da2bed3b6b38a6a152d36a2271da0b76140
-
SSDEEP
12288:4MxXmahZxYbxWtlrYUeAzV3bbAsdsQ0SK7m7K4sHgcpCYrNZyl:7x3pwxmlrHdhs97cICQZ0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-