General
-
Target
d37df64a441aae0025e509e08dace830.exe
-
Size
670KB
-
Sample
221206-jxpg6acb6y
-
MD5
d37df64a441aae0025e509e08dace830
-
SHA1
e466c3fd79844bde116aa7b372bde23316e9acd8
-
SHA256
5e63926b7ce5fb0d4bc1363397c655d0c3b29114497308db183b124b048c033f
-
SHA512
4ce48986a74c1e099e6177b865d41e950c2c073306c0464f7b060a696d217826081b1c4af355594694304dcb5eaffedfd7a6ff74defb9fd119bca5ace06039a7
-
SSDEEP
12288:iPuYd+V6b1momPZef5XmeFMGIhZNKfNo4uQYWOgBlpkLnLR0iFRnbGOOPuYd+V6b:iPuYd+V6bIomxi5XPyLKfN6QYPgj2zL
Static task
static1
Behavioral task
behavioral1
Sample
d37df64a441aae0025e509e08dace830.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d37df64a441aae0025e509e08dace830.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5466358579:AAFHSCLt1chyZSTsCVrxZSdLSPQ_50Hs-ww/
Targets
-
-
Target
d37df64a441aae0025e509e08dace830.exe
-
Size
670KB
-
MD5
d37df64a441aae0025e509e08dace830
-
SHA1
e466c3fd79844bde116aa7b372bde23316e9acd8
-
SHA256
5e63926b7ce5fb0d4bc1363397c655d0c3b29114497308db183b124b048c033f
-
SHA512
4ce48986a74c1e099e6177b865d41e950c2c073306c0464f7b060a696d217826081b1c4af355594694304dcb5eaffedfd7a6ff74defb9fd119bca5ace06039a7
-
SSDEEP
12288:iPuYd+V6b1momPZef5XmeFMGIhZNKfNo4uQYWOgBlpkLnLR0iFRnbGOOPuYd+V6b:iPuYd+V6bIomxi5XPyLKfN6QYPgj2zL
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-