General
-
Target
1399a8cb59c05e00e63f5ba44446557e.bin
-
Size
544KB
-
Sample
230511-bdtc1acg7v
-
MD5
63228ed16bfdf7b31688cb25b37eb89c
-
SHA1
126c5d32fd38209c5b591493e3a1d1b7b5525a4b
-
SHA256
408407707c5c00d8a6bab7761a296f7ddefe93e50da7746dab3bb7778631d815
-
SHA512
7ed5041571f53b32875669a1ad5e4f3a7d4473475a02108dd01186a0a5df37f83d928f21a9151bf61fcfb5684bd8c5a9adbb6e022fc1492d806f998c9a4a5b1e
-
SSDEEP
12288:GP4lGZt6aB/dXEvRHAHQHJr+LWQOBxFNgLab9m/khnR:k/WadpEQAQOBdXe4
Static task
static1
Behavioral task
behavioral1
Sample
5a224ab3b182f13b491469c57c336848721fd9b3205c7b7905b1d05e5d99aefa.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5a224ab3b182f13b491469c57c336848721fd9b3205c7b7905b1d05e5d99aefa.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5635409590:AAHInAR4dWLcsUes3TU8Nj2UQrEubKrXKLs/
Targets
-
-
Target
5a224ab3b182f13b491469c57c336848721fd9b3205c7b7905b1d05e5d99aefa.exe
-
Size
612KB
-
MD5
1399a8cb59c05e00e63f5ba44446557e
-
SHA1
593445cc2ad091b367aedd6e4107dfb210375ff3
-
SHA256
5a224ab3b182f13b491469c57c336848721fd9b3205c7b7905b1d05e5d99aefa
-
SHA512
c93da49aa0e29da478d74b8b90a27ca3b11c5b50011eec1692eed0794f9ab610c9c05568052e9887e6ad944e688f0e8120fea9620f3f16695d55a37d68aff93b
-
SSDEEP
12288:CNj5Ay3SHAdvVPz95iez6PGD9Ai22UegR3FTthxezP9YC:C3IHWVpowX9AwUlFTthxCb
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-