General
-
Target
SecuriteInfo.com.Win64.Evo-gen.23783.29810
-
Size
481KB
-
Sample
221125-e56n7abe84
-
MD5
fe9ba4720007e83dce56fc48db01714e
-
SHA1
22001f0203006ea0ca3770b4f9e7a623b7508e4f
-
SHA256
9b752fc57f6cd1b2f7869f232c6860adf24bcc3454d330e9f481671b27b7dc0c
-
SHA512
400d399fc8a1296d02f6828d94a2b4ca98752fabe3940fe0673790f39271a0f119e3684fdfdb95e7045379247a0afdd719eb5d79d83d76846cdf062d0be1163a
-
SSDEEP
12288:+9N5ED78SX7p+yqWmg1VvagwxOVKTa/qo6b82q3AM0Yn6fEa:+9UMg1+yqkvagfVKTORNhx0Yn6c
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win64.Evo-gen.23783.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win64.Evo-gen.23783.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5826208898:AAHq1wGhT3E-mEl-_VCUxWwOZtnwnWe6Rp0/
Targets
-
-
Target
SecuriteInfo.com.Win64.Evo-gen.23783.29810
-
Size
481KB
-
MD5
fe9ba4720007e83dce56fc48db01714e
-
SHA1
22001f0203006ea0ca3770b4f9e7a623b7508e4f
-
SHA256
9b752fc57f6cd1b2f7869f232c6860adf24bcc3454d330e9f481671b27b7dc0c
-
SHA512
400d399fc8a1296d02f6828d94a2b4ca98752fabe3940fe0673790f39271a0f119e3684fdfdb95e7045379247a0afdd719eb5d79d83d76846cdf062d0be1163a
-
SSDEEP
12288:+9N5ED78SX7p+yqWmg1VvagwxOVKTa/qo6b82q3AM0Yn6fEa:+9UMg1+yqkvagfVKTORNhx0Yn6c
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-