General
-
Target
FİYAT İSTEĞİ82032023.exe
-
Size
500KB
-
Sample
230329-jjnzgafc73
-
MD5
01f1e05c0db18b1197abe20d9d7fe39d
-
SHA1
36ff0a02c57f1150c6dffa5d620cdc357181604d
-
SHA256
446e23b2ec4a53c537ae29ff5964958702510c8b46c72b68d9141f238a5fe691
-
SHA512
a013168eb1173a619a8ff93292878faa60f8635ff51d23f0e4aaadb61e4dce46186255aef35932f1003b570d6868f0e5bf4b21fe9b4f257dff870cb449053913
-
SSDEEP
12288:Oowkeve7u1hSFHAHnQTRrZYO1HLLY5dXmktgCOfMUd+d:OowdvcunegHQT7YO1HL0dXmTCv
Static task
static1
Behavioral task
behavioral1
Sample
FİYAT İSTEĞİ82032023.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
FİYAT İSTEĞİ82032023.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5409839916:AAEYUYZy0IhJQAm4VXi620si4okGW8FDL2w/
Targets
-
-
Target
FİYAT İSTEĞİ82032023.exe
-
Size
500KB
-
MD5
01f1e05c0db18b1197abe20d9d7fe39d
-
SHA1
36ff0a02c57f1150c6dffa5d620cdc357181604d
-
SHA256
446e23b2ec4a53c537ae29ff5964958702510c8b46c72b68d9141f238a5fe691
-
SHA512
a013168eb1173a619a8ff93292878faa60f8635ff51d23f0e4aaadb61e4dce46186255aef35932f1003b570d6868f0e5bf4b21fe9b4f257dff870cb449053913
-
SSDEEP
12288:Oowkeve7u1hSFHAHnQTRrZYO1HLLY5dXmktgCOfMUd+d:OowdvcunegHQT7YO1HL0dXmTCv
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-