General
-
Target
5f9df277772cffcfd8df579c4f8d1479979e35dd34f2d67fc68e935a6b3d3ab2.exe
-
Size
876KB
-
Sample
230403-qxyt6agf9v
-
MD5
f8fb9dbf412cbda6d97af028c62c11ec
-
SHA1
88b295686363efab1d68012e09e4dc3ce3e45c92
-
SHA256
5f9df277772cffcfd8df579c4f8d1479979e35dd34f2d67fc68e935a6b3d3ab2
-
SHA512
4ac9f95eaffdcc4269845a8b7d17bac7b15d07775f468a4c7849d5863565bc745dcdcb1dc942106df977b81b9e5eb382a35e72fa5a7d01164620820142e6400b
-
SSDEEP
12288:7EEmYMUnFW/Nut1Tm+L0EPtEhySCbA8habZcwqbcu0lu+vAw94jHXBOewSi07sIX:7EEUEtBZPY/6A8hemdLWUHXgerxYRqv
Static task
static1
Behavioral task
behavioral1
Sample
5f9df277772cffcfd8df579c4f8d1479979e35dd34f2d67fc68e935a6b3d3ab2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5f9df277772cffcfd8df579c4f8d1479979e35dd34f2d67fc68e935a6b3d3ab2.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5594234630:AAHms4o6VapBzpjlsKSI1DgUtsGG2i7HL1o/
Targets
-
-
Target
5f9df277772cffcfd8df579c4f8d1479979e35dd34f2d67fc68e935a6b3d3ab2.exe
-
Size
876KB
-
MD5
f8fb9dbf412cbda6d97af028c62c11ec
-
SHA1
88b295686363efab1d68012e09e4dc3ce3e45c92
-
SHA256
5f9df277772cffcfd8df579c4f8d1479979e35dd34f2d67fc68e935a6b3d3ab2
-
SHA512
4ac9f95eaffdcc4269845a8b7d17bac7b15d07775f468a4c7849d5863565bc745dcdcb1dc942106df977b81b9e5eb382a35e72fa5a7d01164620820142e6400b
-
SSDEEP
12288:7EEmYMUnFW/Nut1Tm+L0EPtEhySCbA8habZcwqbcu0lu+vAw94jHXBOewSi07sIX:7EEUEtBZPY/6A8hemdLWUHXgerxYRqv
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-