General
-
Target
SecuriteInfo.com.Variant.MSILHeracles.80732.11982.8549.exe
-
Size
882KB
-
Sample
230507-qqm43seg63
-
MD5
336a11f0599570c025e2458715d67311
-
SHA1
f24e771c27b2944055084f950edc1b7119e63699
-
SHA256
f4c51da15914ffd80de043160163b5a91561def1d1f28fbb016c3f60021a0b45
-
SHA512
b1a2031ac3ef95a6fbb9c173bb3ecb991eea062394e864c008d1e6981d2a1bc2b1a6b7795be6bd329df04645592fd8e9ab3f6554e69f831280fce5cf83d84a33
-
SSDEEP
12288:FiCo+rkce4mGLiOfEt3aXGOLCO+cA9ZLxWceb0nq4HxREzqS66JRakydHV7bsHpB:84muiOUaXBLNFcxWceYn5HJSt
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.MSILHeracles.80732.11982.8549.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Variant.MSILHeracles.80732.11982.8549.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5901460996:AAHf6PQOiB7G-2gLPDnJ7ICMAJBVgaZdf78/
Targets
-
-
Target
SecuriteInfo.com.Variant.MSILHeracles.80732.11982.8549.exe
-
Size
882KB
-
MD5
336a11f0599570c025e2458715d67311
-
SHA1
f24e771c27b2944055084f950edc1b7119e63699
-
SHA256
f4c51da15914ffd80de043160163b5a91561def1d1f28fbb016c3f60021a0b45
-
SHA512
b1a2031ac3ef95a6fbb9c173bb3ecb991eea062394e864c008d1e6981d2a1bc2b1a6b7795be6bd329df04645592fd8e9ab3f6554e69f831280fce5cf83d84a33
-
SSDEEP
12288:FiCo+rkce4mGLiOfEt3aXGOLCO+cA9ZLxWceb0nq4HxREzqS66JRakydHV7bsHpB:84muiOUaXBLNFcxWceYn5HJSt
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-