General
-
Target
SOA.zip
-
Size
452KB
-
Sample
230516-lwmnaaag5y
-
MD5
db440bf93422632e4b68357488beec8f
-
SHA1
d0238fa05b550c460ea187acfebf252630cbe9bc
-
SHA256
27f0108dffaf853ead64f1372712383f02a98f8bf075ffa311eb4ee51a4608c3
-
SHA512
829adafa4da2074025a016724063e31dd258aa1e1d5405cd63348782e54eba66f024a85a6b716f59613a2f07936fb3fc8446283e84e68e58f419c75f971109e4
-
SSDEEP
12288:1lyZwKvZwJ3FSvjSbysp78Md8ALfOH7JHUJ03fdKpr:uZZwow7p75LgJHUe3qr
Static task
static1
Behavioral task
behavioral1
Sample
SOA.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SOA.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5814058627:AAFjPgERfyp3AZJXAfISMezajcw2VR_A_9U/
Targets
-
-
Target
SOA.exe
-
Size
782KB
-
MD5
e8c16dd88bb8a107d20fcef7e7e7ae43
-
SHA1
1421a3ead0596c0fc83d3cc49ee7e604cb8d5da2
-
SHA256
7c32af309a2521511d759a08cdc7cefc647e94cbdd590e7f7ef8ef24fa8b539a
-
SHA512
f00d4b77cd3267d08eb3acc749e84e60607903b8d7319093b8de76fdaef4d91ffd2bbfb4b14cc7cf495452679f6304028f20e75777f23abd9a71b47b2e75c87c
-
SSDEEP
12288:DQFHSljSlYsrj8MD8ALvOzlHHUv0B/Zd:D9wNrjLLUHHU8BT
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-