General
-
Target
3A6FED5A4FA870CFC6D6A5DDE2136C3FED7F97AE34F0C11A902EA2008D6FC2B5
-
Size
1.5MB
-
Sample
221123-r26agaac42
-
MD5
84e9f7f00e0315e7fe4bdfd4cc8496ee
-
SHA1
5f2f3ca0a15b3286778d3d42a580dbac3a24cdbe
-
SHA256
3a6fed5a4fa870cfc6d6a5dde2136c3fed7f97ae34f0c11a902ea2008d6fc2b5
-
SHA512
e8f38c01afea0c3ca95dbf9dd551e0a3b15d900307fdfbefc5b02bf7f269953d8c0277575ff8fc9015f91b8ce6bd13caaf6ccc3ec98582c882ca1c0568ccf38e
-
SSDEEP
24576:68TAqbDuUBSOmS5aMy8282V5UZXq7afs:TDXBVmMa9URqGU
Static task
static1
Behavioral task
behavioral1
Sample
20211104.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
20211104.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5796842243:AAESM2w0ubqts6zEsE_xN4PZ56pLfxQ9e7M/
Targets
-
-
Target
20211104.EXE
-
Size
936KB
-
MD5
77694f1cfa30a4ea6c65be837dd013d9
-
SHA1
e1ce7bf4c2ca9f342c12a56d9dcee84891f62f8b
-
SHA256
248a39f30a5d874ed2c08048affc38d9fc6cce83e784e7bfe43f2ff41fc59258
-
SHA512
ae7433c89d83fab3cb01c641ee2d7437c3dd0ac196219249cfd1e89f392a5d440d595141d3a4f6676fd8fa3bb41ac7dd6e51b5f1ec59109f8abe4d60a6a0b36f
-
SSDEEP
24576:D8TAqbDuUBSOmS5aMy8282V5UZXq7afs:QDXBVmMa9URqGU
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-