General
-
Target
file.exe
-
Size
394KB
-
Sample
221124-t1ykcafd38
-
MD5
2a163403e00ba8afbe3c7a2e6df3e2e2
-
SHA1
404038a796396209580a64a537b57695bbd9b175
-
SHA256
4a8bba516cd171925cf36969b9e882c1029dbf88383463f9f646145f54fc35ef
-
SHA512
6a7fdae05a3f2945ef2a8b87c1495dc00a69daa66355cd1009e0b924919f25314b47e541aefd1465c0ca6f2db0dc2b9796b056c1357aa67721ee044446d91187
-
SSDEEP
6144:QBn12ZAxOykmTM3B8+EszGP2Raz6MlQBvN5JpENjKi7E1HyQlBZIs7Y8X8lkP:g2EcmfDsw2AH+7QYj1HyQJ37Ymj
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5655543251:AAF6zs8TWZ5wmyQhXrUZEpQjh6VaOy-aYoQ/
Targets
-
-
Target
file.exe
-
Size
394KB
-
MD5
2a163403e00ba8afbe3c7a2e6df3e2e2
-
SHA1
404038a796396209580a64a537b57695bbd9b175
-
SHA256
4a8bba516cd171925cf36969b9e882c1029dbf88383463f9f646145f54fc35ef
-
SHA512
6a7fdae05a3f2945ef2a8b87c1495dc00a69daa66355cd1009e0b924919f25314b47e541aefd1465c0ca6f2db0dc2b9796b056c1357aa67721ee044446d91187
-
SSDEEP
6144:QBn12ZAxOykmTM3B8+EszGP2Raz6MlQBvN5JpENjKi7E1HyQlBZIs7Y8X8lkP:g2EcmfDsw2AH+7QYj1HyQJ37Ymj
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-