General
-
Target
Invoice # 27781.exe
-
Size
365KB
-
Sample
240424-rznmmsbf58
-
MD5
f5c30a79af9acf6fc4065cad77aa0fd3
-
SHA1
222030b3943e9ed72a9c0b1a4bd74293c15e2dbe
-
SHA256
64c3a2f1f3d66c15c7a383c838347878c5925030bf93657807807d0e9e864846
-
SHA512
093640c3a7dbcdd5d388cd29f434c4a0d7f2381f89325418ae0a9a4a03a4dae798cc7dbdcf88897b79f8327222de07414cf1f7742c2db3350c4556e50afd29f4
-
SSDEEP
6144:7V13TaaCOyVm4adic91/pyru0AZ6Y4e5P1p1h2CVIzTARnDFkeePeov+:BVauyVRuBpyy1LP1rh2Cazteke
Static task
static1
Behavioral task
behavioral1
Sample
Invoice # 27781.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Invoice # 27781.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7185592808:AAH40VecOIxIokAMjd2dL-3MoQxpbXJyxfE/
Targets
-
-
Target
Invoice # 27781.exe
-
Size
365KB
-
MD5
f5c30a79af9acf6fc4065cad77aa0fd3
-
SHA1
222030b3943e9ed72a9c0b1a4bd74293c15e2dbe
-
SHA256
64c3a2f1f3d66c15c7a383c838347878c5925030bf93657807807d0e9e864846
-
SHA512
093640c3a7dbcdd5d388cd29f434c4a0d7f2381f89325418ae0a9a4a03a4dae798cc7dbdcf88897b79f8327222de07414cf1f7742c2db3350c4556e50afd29f4
-
SSDEEP
6144:7V13TaaCOyVm4adic91/pyru0AZ6Y4e5P1p1h2CVIzTARnDFkeePeov+:BVauyVRuBpyy1LP1rh2Cazteke
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-