General
-
Target
15d664bf81b4d721f62e6cb6500de8d2.exe
-
Size
651KB
-
Sample
221031-wrfz2sbfg4
-
MD5
15d664bf81b4d721f62e6cb6500de8d2
-
SHA1
d95d22d179749a21178ba90b2d6e55168ad046b1
-
SHA256
7773c82869650303e9f60d548bac39f1e88a860be35ce83a1a3f9c700b4fb7f1
-
SHA512
c105408b2d3a89aa85c8a8f98fe7287c22f1b92c3d007b293fc5db771a7a83722ee63b830d65215358fee57b5f3276874273c57a001d85bd962d16dc559662d8
-
SSDEEP
12288:NG2iNIh7mld48E6mTB4LXJplsdt2YV8ezf85Zkomrych:Y1LqBUXfCGy8Lmry
Static task
static1
Behavioral task
behavioral1
Sample
15d664bf81b4d721f62e6cb6500de8d2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
15d664bf81b4d721f62e6cb6500de8d2.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5703265641:AAHWaRqhHIb5XaiSZoDQICi4rUoOPHsaRDs/
Targets
-
-
Target
15d664bf81b4d721f62e6cb6500de8d2.exe
-
Size
651KB
-
MD5
15d664bf81b4d721f62e6cb6500de8d2
-
SHA1
d95d22d179749a21178ba90b2d6e55168ad046b1
-
SHA256
7773c82869650303e9f60d548bac39f1e88a860be35ce83a1a3f9c700b4fb7f1
-
SHA512
c105408b2d3a89aa85c8a8f98fe7287c22f1b92c3d007b293fc5db771a7a83722ee63b830d65215358fee57b5f3276874273c57a001d85bd962d16dc559662d8
-
SSDEEP
12288:NG2iNIh7mld48E6mTB4LXJplsdt2YV8ezf85Zkomrych:Y1LqBUXfCGy8Lmry
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-