General
-
Target
z0Transferslip.exe
-
Size
692KB
-
Sample
230413-n7fp8abb62
-
MD5
523420934008337bc65cd0ee6a40adbf
-
SHA1
6e21b99481d21aab127e702a7b6a4582255ed18e
-
SHA256
8bdb93748c95f7288c8e062db2c2ebff27e89c6e0f031f1c527016d5140f37b2
-
SHA512
098fdae6e0265663ff49b30f3685a509bd997207bb818f6d4f837b4ec7a6e02c65d7286500e8ecdde9bf0fa167e4b3be6ff1173bdc479c49fff1af6cc2f19264
-
SSDEEP
12288:ntwI0pW48+hNknKT7GJejOtysczjLdhys//HzrgML3OEfKvajdC8Qi5fliadEIP1:9617GJrYvXLdhys3TrgMrOEff5C8Qi5L
Static task
static1
Behavioral task
behavioral1
Sample
z0Transferslip.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
z0Transferslip.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6192832133:AAF7C5Hu2cAny_oozlOAGw_7DWfvYVumEbE/
Targets
-
-
Target
z0Transferslip.exe
-
Size
692KB
-
MD5
523420934008337bc65cd0ee6a40adbf
-
SHA1
6e21b99481d21aab127e702a7b6a4582255ed18e
-
SHA256
8bdb93748c95f7288c8e062db2c2ebff27e89c6e0f031f1c527016d5140f37b2
-
SHA512
098fdae6e0265663ff49b30f3685a509bd997207bb818f6d4f837b4ec7a6e02c65d7286500e8ecdde9bf0fa167e4b3be6ff1173bdc479c49fff1af6cc2f19264
-
SSDEEP
12288:ntwI0pW48+hNknKT7GJejOtysczjLdhys//HzrgML3OEfKvajdC8Qi5fliadEIP1:9617GJrYvXLdhys3TrgMrOEff5C8Qi5L
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-