General
-
Target
8C679BEA1B893524E906B550EC56C59F0420EE71990D5DF7AD1CA4BA2D628876
-
Size
1.2MB
-
Sample
221208-yfad8sbb84
-
MD5
64b94a72cf66a2839b4977bf7b11ce93
-
SHA1
fafee6c24c6c543e154e21e9f35db43ed55cd4ec
-
SHA256
8c679bea1b893524e906b550ec56c59f0420ee71990d5df7ad1ca4ba2d628876
-
SHA512
5fa9f628f9cf72e5c242086bfaae091cec2cf38410c8ecb2f1e8af8683dd6c8fda7922a7268b3060e5d8a836989e35d717cf161a3127070cae170d9454ec29d3
-
SSDEEP
384:MZqRwksLCohlkbWG8tUHHojSeOiV9qXBKmFptYcFmVc03K:xCvOWGFHHfXtYcFmVc6K
Static task
static1
Behavioral task
behavioral1
Sample
SOLICITU.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
SOLICITU.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5785178474:AAHMax-4L3BCI7oKxZotKaB9eFbj8UiUu1U/
Targets
-
-
Target
SOLICITU.EXE
-
Size
48KB
-
MD5
6788d890f0045ccb84b0917edb6e10f8
-
SHA1
4de7702baee599eb44b019fd2c78136db5ef67e1
-
SHA256
2feaed19066bd61d7d6995b69373271a65caa1aa55d040fa4234fe98268d0e72
-
SHA512
40dabe74ee3f26176450aa356c1e310fdb764f009d55f514b20bf1eba87a2f9992994017f40dc95b654ee25d19264852f5142b272ca0bb2d6097d61c36cc87bc
-
SSDEEP
384:5qRwksLCohlkbWG8tUHHojSeOiV9qXBKmFptYcFmVc03K:eCvOWGFHHfXtYcFmVc6K
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-