General
-
Target
Fatura_SUN202200000166.exe
-
Size
460KB
-
Sample
230102-lycabsdh26
-
MD5
25b24cc692dbff9a944e08722cf67574
-
SHA1
dedce1680f802b0ddc708ab74eba5cd5f87e658f
-
SHA256
4dfcba72b64ae285fee5ba43764d81e4c436ce8df68730405c197b5ac69d3698
-
SHA512
64bc777c16e887e85cb4c8b263fa33589120d7ce77cb94e9c3ed1ad1242954ce3e4c04b544c28335f84ebe18f100d43ed99d59096415e315df303bb3ded255e3
-
SSDEEP
12288:iY5/tFGdaxnb/4zjXvj5uIG3GpAu8EY9I:iY5/rW6nb/4f/Fm2pVA9I
Static task
static1
Behavioral task
behavioral1
Sample
Fatura_SUN202200000166.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Fatura_SUN202200000166.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5932499274:AAFVgY_mSAbCu0fXfBWMuUmyk56JtTf6--Q/
Targets
-
-
Target
Fatura_SUN202200000166.exe
-
Size
460KB
-
MD5
25b24cc692dbff9a944e08722cf67574
-
SHA1
dedce1680f802b0ddc708ab74eba5cd5f87e658f
-
SHA256
4dfcba72b64ae285fee5ba43764d81e4c436ce8df68730405c197b5ac69d3698
-
SHA512
64bc777c16e887e85cb4c8b263fa33589120d7ce77cb94e9c3ed1ad1242954ce3e4c04b544c28335f84ebe18f100d43ed99d59096415e315df303bb3ded255e3
-
SSDEEP
12288:iY5/tFGdaxnb/4zjXvj5uIG3GpAu8EY9I:iY5/rW6nb/4f/Fm2pVA9I
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-