General
-
Target
z57zoVD1qRVURCdvP.exe
-
Size
678KB
-
Sample
230414-p9r2pshh64
-
MD5
662c2d967791997bb799ca6f6ca39cbc
-
SHA1
cc8fb5fd40c07b08d050df8399e5662fa9f41114
-
SHA256
0801817ef1c012615750ffa271d26b484e6460c929c14a87d4a78ffd579ada87
-
SHA512
d29ae1cbdbca48de53982381121dc3a6c453521bb3a38c1a80d98c667c66ec50d75bcba000c876a3d3dc87a04871fe9c8a84334ca9a17f3678c0633e9227c805
-
SSDEEP
12288:NRry3ItEaI3IpvGkz3KVVP7lu8ETxHylCdiyFWngXqG3xqO7anaB:Pr1v93U7M8ySElpBqjaB
Static task
static1
Behavioral task
behavioral1
Sample
z57zoVD1qRVURCdvP.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
z57zoVD1qRVURCdvP.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6174413593:AAEFJFfmmgKHkg-43MZw2Pt5EAT6z2Bs9Ug/
Targets
-
-
Target
z57zoVD1qRVURCdvP.exe
-
Size
678KB
-
MD5
662c2d967791997bb799ca6f6ca39cbc
-
SHA1
cc8fb5fd40c07b08d050df8399e5662fa9f41114
-
SHA256
0801817ef1c012615750ffa271d26b484e6460c929c14a87d4a78ffd579ada87
-
SHA512
d29ae1cbdbca48de53982381121dc3a6c453521bb3a38c1a80d98c667c66ec50d75bcba000c876a3d3dc87a04871fe9c8a84334ca9a17f3678c0633e9227c805
-
SSDEEP
12288:NRry3ItEaI3IpvGkz3KVVP7lu8ETxHylCdiyFWngXqG3xqO7anaB:Pr1v93U7M8ySElpBqjaB
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-