General
-
Target
27caf0391db69d2b2543a0172747e62a9a6e208c
-
Size
556KB
-
Sample
230203-xrrbfsda5x
-
MD5
b757c4ac5a46c4e9fc2cf9e924702804
-
SHA1
27caf0391db69d2b2543a0172747e62a9a6e208c
-
SHA256
6941a5420e23e7309cc09e6ffebf847a7c781dbbb726996a2b3d36340d347819
-
SHA512
79cb0c6d3e2ec59f230fb221937104bd9a6890276eb1c0a8283340359380610cc8f8b3c0875b1b0e360967d50f924a9a8b4be7a2f70165927d3278f660198b36
-
SSDEEP
12288:CYZ/txeoKFg+15c6qRUbTAg9sSBa04UtUFeJ9/TG+R:CYZ/HeoKC+1KnG9sSp4UtUcn/R
Static task
static1
Behavioral task
behavioral1
Sample
27caf0391db69d2b2543a0172747e62a9a6e208c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
27caf0391db69d2b2543a0172747e62a9a6e208c.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6189375980:AAEQgcKnWY3deSQI5AAcHwLSEAvydZ5KNIs/
Targets
-
-
Target
27caf0391db69d2b2543a0172747e62a9a6e208c
-
Size
556KB
-
MD5
b757c4ac5a46c4e9fc2cf9e924702804
-
SHA1
27caf0391db69d2b2543a0172747e62a9a6e208c
-
SHA256
6941a5420e23e7309cc09e6ffebf847a7c781dbbb726996a2b3d36340d347819
-
SHA512
79cb0c6d3e2ec59f230fb221937104bd9a6890276eb1c0a8283340359380610cc8f8b3c0875b1b0e360967d50f924a9a8b4be7a2f70165927d3278f660198b36
-
SSDEEP
12288:CYZ/txeoKFg+15c6qRUbTAg9sSBa04UtUFeJ9/TG+R:CYZ/HeoKC+1KnG9sSp4UtUcn/R
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-