General
-
Target
INVOICE.exe
-
Size
996KB
-
Sample
230630-ptl6hsbf97
-
MD5
f1a3492ad9b9f7134c4954a565478e6f
-
SHA1
276950b89f2a9a0b1689d4aa14f6604075c2bd44
-
SHA256
cef9ee760a9e4e3d132a05164243a878622db8cb86d26753e10a4430312d3486
-
SHA512
6f0bbaaca449f188716ba1643535f6edc85fe1510e6a2c190952158e502774384d5a7532172a320fb8c204377a249e79b791f0a3487863d9e43b28f2fff02adc
-
SSDEEP
12288:IrBk763UvVOD4vNfHs+w2AEOUdS6B7R2xuSH5MfPboK8:IruoU9lF42omQxu1Hg
Static task
static1
Behavioral task
behavioral1
Sample
INVOICE.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
INVOICE.exe
Resource
win10v2004-20230621-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6048733251:AAHRY3bwFxY_dCpUKVaxkoIu25MIjLFtqRA/
Targets
-
-
Target
INVOICE.exe
-
Size
996KB
-
MD5
f1a3492ad9b9f7134c4954a565478e6f
-
SHA1
276950b89f2a9a0b1689d4aa14f6604075c2bd44
-
SHA256
cef9ee760a9e4e3d132a05164243a878622db8cb86d26753e10a4430312d3486
-
SHA512
6f0bbaaca449f188716ba1643535f6edc85fe1510e6a2c190952158e502774384d5a7532172a320fb8c204377a249e79b791f0a3487863d9e43b28f2fff02adc
-
SSDEEP
12288:IrBk763UvVOD4vNfHs+w2AEOUdS6B7R2xuSH5MfPboK8:IruoU9lF42omQxu1Hg
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-