General
-
Target
eff08088f90a7edb6db9e6561249dce53c56c4a682cd114e43befabed147fc40
-
Size
1.4MB
-
Sample
230103-gepzvsac94
-
MD5
1e667b9347d95ae3ed896fd2d7a07004
-
SHA1
8acc1da971d6c41224cb3a4ecea6d8cfd17d463e
-
SHA256
eff08088f90a7edb6db9e6561249dce53c56c4a682cd114e43befabed147fc40
-
SHA512
da2f988d322aedfae77d5146ec8dbfbc8221448b5f09fac67f2e6f71dec363dc996fe44d8903b6dc125b2f7d9dd4cf41d478653e3162a5897fc5de6e656e6b52
-
SSDEEP
24576:QAOcZNO5kFiNBfipwizdoq21GhKP770lYglQTQD3+L8Fl:OEsNQdXo7IlYgaG+L0l
Static task
static1
Behavioral task
behavioral1
Sample
eff08088f90a7edb6db9e6561249dce53c56c4a682cd114e43befabed147fc40.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
eff08088f90a7edb6db9e6561249dce53c56c4a682cd114e43befabed147fc40.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1836400811:AAHbceSsBewgu2-18DdhyOIr5kwyIr-_36E/
Targets
-
-
Target
eff08088f90a7edb6db9e6561249dce53c56c4a682cd114e43befabed147fc40
-
Size
1.4MB
-
MD5
1e667b9347d95ae3ed896fd2d7a07004
-
SHA1
8acc1da971d6c41224cb3a4ecea6d8cfd17d463e
-
SHA256
eff08088f90a7edb6db9e6561249dce53c56c4a682cd114e43befabed147fc40
-
SHA512
da2f988d322aedfae77d5146ec8dbfbc8221448b5f09fac67f2e6f71dec363dc996fe44d8903b6dc125b2f7d9dd4cf41d478653e3162a5897fc5de6e656e6b52
-
SSDEEP
24576:QAOcZNO5kFiNBfipwizdoq21GhKP770lYglQTQD3+L8Fl:OEsNQdXo7IlYgaG+L0l
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-