General
-
Target
doc10010679052382012143717.exe
-
Size
1.0MB
-
Sample
230317-jj9aeaeh59
-
MD5
1df06ea86eaac59f70bfb0644f3ad683
-
SHA1
91e7dea1ab7bf436fc4837df885f167c1dc91d21
-
SHA256
34f94d5066b7b34db54d13762f1f3b11ac1b4cdfb971cc822bc3c4d9a7394994
-
SHA512
0f2cf855ec05185d4fb046f4552d742a14dad9fdf78e58daa4fe77f96b8afbe83f5c97cf2d064bfbcd2ce071a7499226a39dd969edfdeecc4a2129c476b71cd4
-
SSDEEP
24576:/TbBv5rULmVeLmvdWULotH9NwCLmtmH6opxUPYhLKX5yaUr:JBVVgeoULGHjVStmHXxUPYc2
Static task
static1
Behavioral task
behavioral1
Sample
doc10010679052382012143717.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
doc10010679052382012143717.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5729374237:AAEdSD-W5rWlJyyU5nwVKvjLxJBT1jTdKRY/
Targets
-
-
Target
doc10010679052382012143717.exe
-
Size
1.0MB
-
MD5
1df06ea86eaac59f70bfb0644f3ad683
-
SHA1
91e7dea1ab7bf436fc4837df885f167c1dc91d21
-
SHA256
34f94d5066b7b34db54d13762f1f3b11ac1b4cdfb971cc822bc3c4d9a7394994
-
SHA512
0f2cf855ec05185d4fb046f4552d742a14dad9fdf78e58daa4fe77f96b8afbe83f5c97cf2d064bfbcd2ce071a7499226a39dd969edfdeecc4a2129c476b71cd4
-
SSDEEP
24576:/TbBv5rULmVeLmvdWULotH9NwCLmtmH6opxUPYhLKX5yaUr:JBVVgeoULGHjVStmHXxUPYc2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-