General
-
Target
7387eeed685b4acdf46a1af416517e28.bin
-
Size
727KB
-
Sample
240204-bvj6nagfhn
-
MD5
f51ac2702afd4fa87d3a3ca787cebdaa
-
SHA1
da6cc37e730aeea18422fb2b29016e369f00fc2e
-
SHA256
9c0dbe12a8a852bb9435d18a5b6351096e02fded87fba408c717f0dc564d1dd8
-
SHA512
5fb024efb7196af868eaafa5d8a5c9a553eac16ffcbf24eda9e6047116caa23c25ad1de4f3190ed7798d3cf397e91b1fd767f166f3685893838f5dd78bb67dc4
-
SSDEEP
12288:8/L7ZHYIyzaIGCr9mZ3r19Iny69u+e+tO+ARPgrXlMCI4A41Eiaxhtir:2n2PT9sr19Iy6Nh8+ARYrXmUAbl6r
Static task
static1
Behavioral task
behavioral1
Sample
INVOICE.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
INVOICE.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6706655031:AAGkoMzTunKhqrnkbDm7gYvkmMRu4Mgw_Dg/
Targets
-
-
Target
INVOICE.exe
-
Size
1006KB
-
MD5
6022e4f816a6e1e3002d1981c26b3792
-
SHA1
6c592baf811ef486039414a60663b72f2619bbb1
-
SHA256
9cca0efc75bc5ec884145d04e3b37f3eea4983422cc0c98ecb64c5c59aa8dd5f
-
SHA512
28dba4e49910eb30df3eac5c25f937077e5e8c448218f1857e8b3e619bb067baec708b7b53e30733a903339c5fee0b817e532370b62b73fe0e6f93c1781d454b
-
SSDEEP
24576:bMyUR0rDcSbDWRZYm+xmeu6n4qkjpT4aPUEIGfH:FDl0ZYmEOT44z
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-