General
-
Target
Payment Confirmation.tgz
-
Size
1.2MB
-
Sample
240528-hnsmsahh9w
-
MD5
512531a51eba86d14b665d32a0d20662
-
SHA1
1dd33a7ff3d6c92be245189152cdf0253240a49a
-
SHA256
f1dfab54f1c84e55cab037422b7010d131e47e9e456cacc0e9eaabd42f6d559f
-
SHA512
cf5cadbeb38291e4292566f88fa7994cd1d0864c1bc9807bccbdeaff66cec088ef35e73191791523ea62121eb82727ed13936a04973793b744561a1384b7d9d1
-
SSDEEP
12288:j9PnLKIX9GelxTYU8PDbKhzku5KbfsbHz+CJ+yyQFNwGiCwvqAAioDV9pDR:RfncecJPuR+yjW3AlDVrR
Static task
static1
Behavioral task
behavioral1
Sample
Payment Confirmation.exe
Resource
win7-20240508-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6897225989:AAEsj1_ySDFr0QUwWeWQMrpxjobbAY0Fqu8/
Targets
-
-
Target
Payment Confirmation.exe
-
Size
619.9MB
-
MD5
6fbd7c61b2230f652b299efa2ff2cb95
-
SHA1
dfec70b5fce9f0a9ac5637b10c02a906a38a643a
-
SHA256
4dc2e497babe81b247fde341e16f801a77fb20487e8bd3c599840437e2283301
-
SHA512
463abab92e7380dcc747060f6134f4c01f23bc3acb4bd3a495c01661cd2e29e5502589bd12d79767a99b02da4a4b9e2ac0f7da6201b239d276e0ecd3bbc8dcad
-
SSDEEP
12288:TKcDV/xXIX9GulFT2vff3Dbmh/gTHR/IzHzmCJAyyQdNwGsQwvwMqZH/2A:Gcuiv339rmxAypWNE2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-