General
-
Target
1919.exe
-
Size
559KB
-
Sample
221124-k9l38sde78
-
MD5
205083f15a3856bc55543a1584fc5e26
-
SHA1
a6d28626b6199d5e74cd403b601971bdc94c31c8
-
SHA256
4e917ed708e6c20ca6f74372e37680aac6af8a9fc214e903ff4297438cf94261
-
SHA512
5ed7c8d21060fb03fdf32a1282b28f8160ced94e3f78facf37dc9d0b158b8e9ecf29aa5f4165cae4860730abe91c99c03218b6ac48c20de905ebbf55ea2e8a5d
-
SSDEEP
6144:bBnyiTgcabVMZhjyaBfQxPul+b5YkD50gkzYLCO9zdGb+B7oSEz2buuEJIDcc4em:YfccMmaB0uWafz+CWGKKiSuywV4YC
Static task
static1
Behavioral task
behavioral1
Sample
1919.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1919.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5453942321:AAF6CS9julQ6K7s5pxacNALwWJ2A52D0EC4/
Targets
-
-
Target
1919.exe
-
Size
559KB
-
MD5
205083f15a3856bc55543a1584fc5e26
-
SHA1
a6d28626b6199d5e74cd403b601971bdc94c31c8
-
SHA256
4e917ed708e6c20ca6f74372e37680aac6af8a9fc214e903ff4297438cf94261
-
SHA512
5ed7c8d21060fb03fdf32a1282b28f8160ced94e3f78facf37dc9d0b158b8e9ecf29aa5f4165cae4860730abe91c99c03218b6ac48c20de905ebbf55ea2e8a5d
-
SSDEEP
6144:bBnyiTgcabVMZhjyaBfQxPul+b5YkD50gkzYLCO9zdGb+B7oSEz2buuEJIDcc4em:YfccMmaB0uWafz+CWGKKiSuywV4YC
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-