General
-
Target
9b19f138d170fb4ac954ca804d5877bdfd4f6d3342fde823a9fe7a6a69c078a5.exe
-
Size
921KB
-
Sample
221211-b2dmfsba91
-
MD5
8f4d9893e92b9a6fc50e6267c6925680
-
SHA1
52b3ba4a07d3167b7ac3d03147891fc4a2a685e1
-
SHA256
9b19f138d170fb4ac954ca804d5877bdfd4f6d3342fde823a9fe7a6a69c078a5
-
SHA512
ad063324e7c7ef14c41bbc2e1370fa8140dc5744ca631010c91b3e2f185834cb6e7af3de1c66ed1b84fd4d9d3608d19e3084483c75e5b9bec814b11e76e0c764
-
SSDEEP
24576:ASoDl9jPUj/9idqBTy66fHjwxdjMbed4JMthZmBH+:SD3AL94uCf0PsJmhSH
Static task
static1
Behavioral task
behavioral1
Sample
9b19f138d170fb4ac954ca804d5877bdfd4f6d3342fde823a9fe7a6a69c078a5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9b19f138d170fb4ac954ca804d5877bdfd4f6d3342fde823a9fe7a6a69c078a5.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5847242711:AAGm1UFys7yP4w0YlRr2vLcRLAEBVCNdjis/
Targets
-
-
Target
9b19f138d170fb4ac954ca804d5877bdfd4f6d3342fde823a9fe7a6a69c078a5.exe
-
Size
921KB
-
MD5
8f4d9893e92b9a6fc50e6267c6925680
-
SHA1
52b3ba4a07d3167b7ac3d03147891fc4a2a685e1
-
SHA256
9b19f138d170fb4ac954ca804d5877bdfd4f6d3342fde823a9fe7a6a69c078a5
-
SHA512
ad063324e7c7ef14c41bbc2e1370fa8140dc5744ca631010c91b3e2f185834cb6e7af3de1c66ed1b84fd4d9d3608d19e3084483c75e5b9bec814b11e76e0c764
-
SSDEEP
24576:ASoDl9jPUj/9idqBTy66fHjwxdjMbed4JMthZmBH+:SD3AL94uCf0PsJmhSH
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-