General
-
Target
PO1919.zip
-
Size
401KB
-
Sample
221124-pll6jsgd2t
-
MD5
2bd3c384732fd898d8a592b7214910eb
-
SHA1
2abfa65ff501604d0aa42524d6cc1d99c5620510
-
SHA256
e3a8533dfda2254f7cc0abcc0d201c6a9285fe6d8c240879bec79b90276eac35
-
SHA512
8a96dc66b14e97c27734b982fad51a9feaab2cb16fa5a327b6cb39f2b2e4b3bb81dde03f746cff28ed1192990c31934cbf93a3b1f249632b96601256377775ba
-
SSDEEP
6144:Md6H6De0KZhjwaBfQFPu9+b5YuD50gkzALCO9xdGb+B7oSEz4buuERIDcc4eKtUW:uW6D5KcaBuuMafzGCSGKmcSucwV4JJ
Static task
static1
Behavioral task
behavioral1
Sample
1919.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1919.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5453942321:AAF6CS9julQ6K7s5pxacNALwWJ2A52D0EC4/
Targets
-
-
Target
1919.exe
-
Size
559KB
-
MD5
205083f15a3856bc55543a1584fc5e26
-
SHA1
a6d28626b6199d5e74cd403b601971bdc94c31c8
-
SHA256
4e917ed708e6c20ca6f74372e37680aac6af8a9fc214e903ff4297438cf94261
-
SHA512
5ed7c8d21060fb03fdf32a1282b28f8160ced94e3f78facf37dc9d0b158b8e9ecf29aa5f4165cae4860730abe91c99c03218b6ac48c20de905ebbf55ea2e8a5d
-
SSDEEP
6144:bBnyiTgcabVMZhjyaBfQxPul+b5YkD50gkzYLCO9zdGb+B7oSEz2buuEJIDcc4em:YfccMmaB0uWafz+CWGKKiSuywV4YC
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-