General
-
Target
E-DEKONT1,DOC.exe
-
Size
194KB
-
Sample
230919-hjl97shd55
-
MD5
bb9bfe851fa3a66ae88c80bab724106b
-
SHA1
ae7636896254dd396c1bf67ad753eb90bef55d12
-
SHA256
3138dcc632d9ad63fe372fa108ee0c1cc73d2cf79da3bf051a57f7ffc5abab37
-
SHA512
9b83f444d90bed165886746c8655e53e61a93a4765607e704d17ff45be5a5215395edb201bcdfa584718d3367bfcd89ff41ea9759098fbb6b78841bd9a491e9e
-
SSDEEP
3072:wDKW1LgppLRHMY0TBfJvjcTp5XTczgCVEfxvPXj5:wDKW1Lgbdl0TBBvjc/nC6vj5
Static task
static1
Behavioral task
behavioral1
Sample
E-DEKONT1,DOC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
E-DEKONT1,DOC.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1153539462454853703/uBqITIGCHxh487IDtEi05_T0CVFY7MPJ28kszIkbpskJK5Vlm6XKFG1spM2XKrJU3dsq
Targets
-
-
Target
E-DEKONT1,DOC.exe
-
Size
194KB
-
MD5
bb9bfe851fa3a66ae88c80bab724106b
-
SHA1
ae7636896254dd396c1bf67ad753eb90bef55d12
-
SHA256
3138dcc632d9ad63fe372fa108ee0c1cc73d2cf79da3bf051a57f7ffc5abab37
-
SHA512
9b83f444d90bed165886746c8655e53e61a93a4765607e704d17ff45be5a5215395edb201bcdfa584718d3367bfcd89ff41ea9759098fbb6b78841bd9a491e9e
-
SSDEEP
3072:wDKW1LgppLRHMY0TBfJvjcTp5XTczgCVEfxvPXj5:wDKW1Lgbdl0TBBvjc/nC6vj5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-