General
-
Target
19AAD89E62883B8EAD9DB879FD1203DD51A2EEEE41D0748A81C7B31C6237BABD
-
Size
652KB
-
Sample
221208-ye3dmaeb3s
-
MD5
71f4964b8edf5560c36a4ad1a1b61408
-
SHA1
4e19db95261c652678f49c54c7763286f340828f
-
SHA256
19aad89e62883b8ead9db879fd1203dd51a2eeee41d0748a81c7b31c6237babd
-
SHA512
712adfd0852e879a7d0baf1f3419e2da41b721c8af4e33f449c29312980e8cc3f0eea60f18cfd758c5f455ca389b4cec48892986e8673edbbd08412e05452e18
-
SSDEEP
12288:o4a4f3OgBYmD12aaLzIskrkk4yzFLmGY7lryP1iZmKbAGZQHMjsTaqFZp5R0lmsx:4e3O8lanErlmGY7luPlKsssGYTi5F/
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT ADVISE_0004.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PAYMENT ADVISE_0004.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1046885137620668476/tqKDZZWFXo6nvWfx10p4wfxf1QI6_dSmYl-LLQGbb4vhhmp9HT4sLvTVg0kj1SgRTQGZ
Targets
-
-
Target
PAYMENT ADVISE_0004.exe
-
Size
841KB
-
MD5
c57e9585bbe179e45833e8b896c73e29
-
SHA1
1c0aa52a527f919f0e575e00dcb7023c553f9d5c
-
SHA256
0a87339cba74896d097ec10a18315d66dc3f98121ba968ff571a29e241646b60
-
SHA512
15b2b749010b6da998063d24aa75a38b0fdda79c523f99b2ff1cc074f64d6551b5854a09adf44df434e4ede55e7562535650e54445bb94096620e10360575263
-
SSDEEP
12288:F/hXvkIY0GZa/4y1v8Vdv+UF9Co2dLi78dkLgxlkg586aWHffauQOQWM6x5BbWIb:8B03giZUFZ2dLg/gxlB5O8f4b
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-