General
-
Target
networksec.exe
-
Size
611KB
-
Sample
230421-xxp1kshd83
-
MD5
b6c9c4471cac3642ad6c1eed4ab5aa98
-
SHA1
f0a454f210ce756984dd6ff1517852de9bdd219f
-
SHA256
0bb23fead3ba01a2ced6b97198a0a12946b4ac4e2c93a39a2286636e484a035a
-
SHA512
854f8510c764b08ef2f3908a5c842a0604c7e29f8974779f957212820f1d95f7281796cd5c0361b91c24add4f213310654e907c600a269688abfd07472d00ca2
-
SSDEEP
12288:qLXsIplAtXX7tk4/SAtSDEpGb2rtw1FnVZ2g3bCUBEM/BkT9g3:qLXsIpitXLpzSiG6rS1ZVZ2gLrBDBkTy
Static task
static1
Behavioral task
behavioral1
Sample
networksec.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
networksec.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5846767138:AAHbrIUF1epdWlFQ2_64LCd8vdF121y1XGE/
Targets
-
-
Target
networksec.exe
-
Size
611KB
-
MD5
b6c9c4471cac3642ad6c1eed4ab5aa98
-
SHA1
f0a454f210ce756984dd6ff1517852de9bdd219f
-
SHA256
0bb23fead3ba01a2ced6b97198a0a12946b4ac4e2c93a39a2286636e484a035a
-
SHA512
854f8510c764b08ef2f3908a5c842a0604c7e29f8974779f957212820f1d95f7281796cd5c0361b91c24add4f213310654e907c600a269688abfd07472d00ca2
-
SSDEEP
12288:qLXsIplAtXX7tk4/SAtSDEpGb2rtw1FnVZ2g3bCUBEM/BkT9g3:qLXsIpitXLpzSiG6rS1ZVZ2gLrBDBkTy
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-