General
-
Target
PO#88224.zip
-
Size
455KB
-
Sample
230517-hx74tsea82
-
MD5
a14bcfb6af44127eef2500c075bb7ada
-
SHA1
8112320003f472fa76e3f0f5cb3cdaa142f901dc
-
SHA256
5e7563f28d1b5ecfcabbfb651823564dbeee5986ec0ad608b446b01c0e74d9fe
-
SHA512
52046f5e8f73cb8fab7bf4ce56be86e56d0a5c01269c86b374a74ca76e91f7f58fe2e0f106bafe5033d9b9cec5aff4b382fb4de9f6822d117ee1c62a3331a1ed
-
SSDEEP
12288:0gcLr2S5jSx0T4xxUVJDYAwBu2NaV2XQFVvohX2ZY:0gcLrR60TNHDYAwBu2NaYgbPZY
Static task
static1
Behavioral task
behavioral1
Sample
PO#88224.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PO#88224.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5814058627:AAFjPgERfyp3AZJXAfISMezajcw2VR_A_9U/
Targets
-
-
Target
PO#88224.exe
-
Size
753KB
-
MD5
ba1dc42c5cbe27f3ed63e436d5fac0c0
-
SHA1
4faacf626c11722671336f4b1210c08b2c26d02a
-
SHA256
12dd7993470fb8771929bc1fa70876866bb29f8a4f43d5c79dc8d643501bd3a0
-
SHA512
135ad53056e9c939b3d09bb080054ed4673513db1b111034ba92951b02c091fc1cee0bd9234b7864f0a8970f37046304aee49ea65243daea06bdfd368cdd46a2
-
SSDEEP
12288:31G4GSljST0TshfMVJDYCwDU2NgD29QJVvGjJ250:44dq0TdHDYCwDU2NgamnP50
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-