General
-
Target
1f2cb6c9e03a40c8192769aa22098b5e.exe
-
Size
952KB
-
Sample
230216-nl61aaha2t
-
MD5
1f2cb6c9e03a40c8192769aa22098b5e
-
SHA1
671df2a28df26142a5c01dc9424e2c3e6b1cd6a5
-
SHA256
d47f545cf0b1dc2ad2418cbba327adad7ac578feebb219fa9084b7ea55ef2e79
-
SHA512
c93b99cb2f859bb723a1a1599f2a4711520bac1cc131fea07abe84bc4f04339e245edbd6c7e43ea2e68563678e7207358b38182a2fe7525b425ceda75b92f0c7
-
SSDEEP
12288:E6nffydd+FLAu1PD6Sww1xjOKQPY/DXUabhEXsx68eEQmYc9XVmTdcMEBAUZMybW:E6nnyaueDyKQPSDh8E0cRPMXyUS5Q
Static task
static1
Behavioral task
behavioral1
Sample
1f2cb6c9e03a40c8192769aa22098b5e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1f2cb6c9e03a40c8192769aa22098b5e.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5693068931:AAGSQSNIWDJM1FzeZVNHS020I9wVBrQdkRM/
Targets
-
-
Target
1f2cb6c9e03a40c8192769aa22098b5e.exe
-
Size
952KB
-
MD5
1f2cb6c9e03a40c8192769aa22098b5e
-
SHA1
671df2a28df26142a5c01dc9424e2c3e6b1cd6a5
-
SHA256
d47f545cf0b1dc2ad2418cbba327adad7ac578feebb219fa9084b7ea55ef2e79
-
SHA512
c93b99cb2f859bb723a1a1599f2a4711520bac1cc131fea07abe84bc4f04339e245edbd6c7e43ea2e68563678e7207358b38182a2fe7525b425ceda75b92f0c7
-
SSDEEP
12288:E6nffydd+FLAu1PD6Sww1xjOKQPY/DXUabhEXsx68eEQmYc9XVmTdcMEBAUZMybW:E6nnyaueDyKQPSDh8E0cRPMXyUS5Q
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-