General
-
Target
2d5d72d557920e6beef5c35e3cdd3ddd1339b2c4306e4b79e540058afede2063.exe
-
Size
358KB
-
Sample
221209-yt921sha5w
-
MD5
7db0bc0c978bda0048ac2944b9b86245
-
SHA1
66e87764ff09ebba04681cbc2c61a43cbfa595b5
-
SHA256
2d5d72d557920e6beef5c35e3cdd3ddd1339b2c4306e4b79e540058afede2063
-
SHA512
a52b5044c908af4c404a5c4f3cf5764aac02f8af08bf7985f209a892a7e7e0e110e64201eadb8fb32b1594cb68cd88071911cb44cf2ae44ffa1b6bfea6fc8efb
-
SSDEEP
6144:LBnb2BEjQdYiIlpaaKRcMoBO5t9Dm/LhGTVwuIWqJllrmuDW5P/G2rb:FLbpxKuM5PqhGTZsJllmua5XG2rb
Static task
static1
Behavioral task
behavioral1
Sample
2d5d72d557920e6beef5c35e3cdd3ddd1339b2c4306e4b79e540058afede2063.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2d5d72d557920e6beef5c35e3cdd3ddd1339b2c4306e4b79e540058afede2063.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5801961827:AAHU2YhkfiXQwgVf7WnbO6mcJG_3zpTOec4/
Targets
-
-
Target
2d5d72d557920e6beef5c35e3cdd3ddd1339b2c4306e4b79e540058afede2063.exe
-
Size
358KB
-
MD5
7db0bc0c978bda0048ac2944b9b86245
-
SHA1
66e87764ff09ebba04681cbc2c61a43cbfa595b5
-
SHA256
2d5d72d557920e6beef5c35e3cdd3ddd1339b2c4306e4b79e540058afede2063
-
SHA512
a52b5044c908af4c404a5c4f3cf5764aac02f8af08bf7985f209a892a7e7e0e110e64201eadb8fb32b1594cb68cd88071911cb44cf2ae44ffa1b6bfea6fc8efb
-
SSDEEP
6144:LBnb2BEjQdYiIlpaaKRcMoBO5t9Dm/LhGTVwuIWqJllrmuDW5P/G2rb:FLbpxKuM5PqhGTZsJllmua5XG2rb
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-