General
-
Target
Inquiry_Specifications.exe
-
Size
589KB
-
Sample
230629-zga8lafg8v
-
MD5
3e2eea13f28c03ad22f0bc5b2e697f36
-
SHA1
b09f33d0433fb28b47a9ad3af56b880410aea6cb
-
SHA256
be916bff213eaafdb32c19caa4c4f95181c4ff9cdf20ba3d99905a9c2360ab41
-
SHA512
720723dbb6a5e1f12fea7a6a9184b64068e66620d8ffc7cbc2f0a9a832c7644e3ed7ba3e9d662676e0ae02a97280e5fb4c20f31a57e3aa68109c21ddf6c3c7e3
-
SSDEEP
12288:1YUpZnmpdsU/HRYUHEWSU1Cm3Dv5lUvlNDQ194:1YhsA6UYU1C2NlUTQ1C
Static task
static1
Behavioral task
behavioral1
Sample
Inquiry_Specifications.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Inquiry_Specifications.exe
Resource
win10-20230621-en
Behavioral task
behavioral3
Sample
Inquiry_Specifications.exe
Resource
win10v2004-20230621-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5349655878:AAGnMhpzchQYN5RbZ88-w3gvA1SNsxWo7ts/
Targets
-
-
Target
Inquiry_Specifications.exe
-
Size
589KB
-
MD5
3e2eea13f28c03ad22f0bc5b2e697f36
-
SHA1
b09f33d0433fb28b47a9ad3af56b880410aea6cb
-
SHA256
be916bff213eaafdb32c19caa4c4f95181c4ff9cdf20ba3d99905a9c2360ab41
-
SHA512
720723dbb6a5e1f12fea7a6a9184b64068e66620d8ffc7cbc2f0a9a832c7644e3ed7ba3e9d662676e0ae02a97280e5fb4c20f31a57e3aa68109c21ddf6c3c7e3
-
SSDEEP
12288:1YUpZnmpdsU/HRYUHEWSU1Cm3Dv5lUvlNDQ194:1YhsA6UYU1C2NlUTQ1C
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-