General
-
Target
No.786161678.exe
-
Size
1.2MB
-
Sample
221209-xj7y8sdh25
-
MD5
51dcaa1d09223f28e429fd5d6c2403b0
-
SHA1
b724b65b6bb16cb956ffa693e3b66da99696ef3f
-
SHA256
6271c48e0ac2fa210f270581b7952c9e065722927745d52b5959bb4097040a70
-
SHA512
61428861a617668784be0fb8f420988ab6988be42f25327777afb776543c6dea64a53c956ade2d591709e67d8e1f9c31c22c24f002dd96929fded055a97269a5
-
SSDEEP
24576:R4vNl9A1PGXRYvnxevatMg5pOfhZmBHE:UN3A0XSvxWat75pMhSH
Static task
static1
Behavioral task
behavioral1
Sample
No.786161678.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
No.786161678.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5890520400:AAHJ6-wblqa9UgNrQiU_F3OpLLrdIMrvJhc/
Targets
-
-
Target
No.786161678.exe
-
Size
1.2MB
-
MD5
51dcaa1d09223f28e429fd5d6c2403b0
-
SHA1
b724b65b6bb16cb956ffa693e3b66da99696ef3f
-
SHA256
6271c48e0ac2fa210f270581b7952c9e065722927745d52b5959bb4097040a70
-
SHA512
61428861a617668784be0fb8f420988ab6988be42f25327777afb776543c6dea64a53c956ade2d591709e67d8e1f9c31c22c24f002dd96929fded055a97269a5
-
SSDEEP
24576:R4vNl9A1PGXRYvnxevatMg5pOfhZmBHE:UN3A0XSvxWat75pMhSH
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-