General
-
Target
e-dekont_html.exe
-
Size
652KB
-
Sample
230516-massvaah3y
-
MD5
cde7c1f79b8159ab607119c438fe119f
-
SHA1
435013ae5ba8fc9ee9948255b537512f0c9ba6b2
-
SHA256
ed4b9afcb717295f5fb71bcc6f408dbbed12c6858ee2f20a1f7bd2ab72074fc6
-
SHA512
f5d68ac386c6f1eb822a5bbea62c71e9c1345693ddf8971809f592e6544066eca552e57a642cc194b3e1181272d9107b62927b6ffe3311ce3de4646e63145031
-
SSDEEP
12288:BY6v5DlZnhAkWsPpibPmLq5iKtwI17fZxtmkII5S5//kQfj6FiwyPA:/hHnqkWcpEmLcth1LZx2US/M0mFPsA
Static task
static1
Behavioral task
behavioral1
Sample
e-dekont_html.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e-dekont_html.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5322219147:AAE0Z9Lq-g-SXI1X2beYR26iGFyieqMa3DE/sendDocument
Targets
-
-
Target
e-dekont_html.exe
-
Size
652KB
-
MD5
cde7c1f79b8159ab607119c438fe119f
-
SHA1
435013ae5ba8fc9ee9948255b537512f0c9ba6b2
-
SHA256
ed4b9afcb717295f5fb71bcc6f408dbbed12c6858ee2f20a1f7bd2ab72074fc6
-
SHA512
f5d68ac386c6f1eb822a5bbea62c71e9c1345693ddf8971809f592e6544066eca552e57a642cc194b3e1181272d9107b62927b6ffe3311ce3de4646e63145031
-
SSDEEP
12288:BY6v5DlZnhAkWsPpibPmLq5iKtwI17fZxtmkII5S5//kQfj6FiwyPA:/hHnqkWcpEmLcth1LZx2US/M0mFPsA
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-