General
-
Target
doc10010679052382012143717.img
-
Size
1.1MB
-
Sample
230317-jzzqxafa65
-
MD5
b39e3336180b7f345770ff5b4725ff39
-
SHA1
3f731651b6c0e2dee3fc9c006ac262f6d2cb068d
-
SHA256
d32bba142663cd6203437f8295f7825cd552326b4b0fdb026167cb4d19ba9cd7
-
SHA512
12ee16bfb06487a6077a17f40a3c5653edb669a52d1ed4157e101a671472320920f2989ef8c57b7edeaef9320bdc793ea292add1fe5996795531872a2c888271
-
SSDEEP
24576:PTbBv5rULmVeLmvdWULotH9NwCLmtmH6opxUPYhLKX5yaU:5BVVgeoULGHjVStmHXxUPYc
Static task
static1
Behavioral task
behavioral1
Sample
doc10010679052382012143717.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
doc10010679052382012143717.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5729374237:AAEdSD-W5rWlJyyU5nwVKvjLxJBT1jTdKRY/
Targets
-
-
Target
doc10010679052382012143717.exe
-
Size
1.0MB
-
MD5
1df06ea86eaac59f70bfb0644f3ad683
-
SHA1
91e7dea1ab7bf436fc4837df885f167c1dc91d21
-
SHA256
34f94d5066b7b34db54d13762f1f3b11ac1b4cdfb971cc822bc3c4d9a7394994
-
SHA512
0f2cf855ec05185d4fb046f4552d742a14dad9fdf78e58daa4fe77f96b8afbe83f5c97cf2d064bfbcd2ce071a7499226a39dd969edfdeecc4a2129c476b71cd4
-
SSDEEP
24576:/TbBv5rULmVeLmvdWULotH9NwCLmtmH6opxUPYhLKX5yaUr:JBVVgeoULGHjVStmHXxUPYc2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-