General
-
Target
bb4eac10bd885d26d6cdbe6d0660ba7f.bin
-
Size
25KB
-
Sample
230503-chynysdd23
-
MD5
8afbdd59c2d4c8be605531ce14efadae
-
SHA1
9dcc05cd543525b5f9756dbb24e768f7671cebd3
-
SHA256
7375444aba915bc49bc66dbb830fb37dccdd0b9fd7ac5a10f5638b8ff15ab696
-
SHA512
472fa5e13b6244b2614746b72f90808822f81c4ddee04a30a10da0a64cb7e2d2d093252cecfd9fcc13a49beb45b1ff85d11b1c6422c359e958f45067718587b0
-
SSDEEP
384:SGjuj9R12131IKB5xFg8qsPr6oqaFBl82iuBL+NyHAe1R9fpWDPuLziOE8RkfQSD:njujc16KoDOBO2i++Mr1R/zdVRg/D
Static task
static1
Behavioral task
behavioral1
Sample
a32c204008b19238bf121a713fc57e95eab775cc388f5466e35c0f024750e777.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a32c204008b19238bf121a713fc57e95eab775cc388f5466e35c0f024750e777.vbs
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6249497455:AAGoVzD6c5m-LvGqgHy15Fb8Bph6gAw7SvM/
Targets
-
-
Target
a32c204008b19238bf121a713fc57e95eab775cc388f5466e35c0f024750e777.vbs
-
Size
1.2MB
-
MD5
bb4eac10bd885d26d6cdbe6d0660ba7f
-
SHA1
59121e22508485c493d12f8a233df27b7e7ad2bf
-
SHA256
a32c204008b19238bf121a713fc57e95eab775cc388f5466e35c0f024750e777
-
SHA512
11af05bff032598539baef418561142da7b6328735d5d2a4733a47df30ee69daed24ecedf573f7fa299a6f876d81faca28fe1da6c961102b29f6179db55ba396
-
SSDEEP
768:II7XTXBje9YWXA0rsntuTKDsonyd2B2ovOm4LOw7A7PTMYTR:fJj9GPeDsFd2AoR4LFuTR
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-