General
-
Target
5ff4c3eb0ad5b96bf4f88fa2a99b2589275daebca86e03f904767221839dff63
-
Size
1.0MB
-
Sample
221124-nggjtsdf9t
-
MD5
0ab4a2ab713a752c61f722baa1af6064
-
SHA1
c2da9dbb319b92a4179e6a3a9a8763cd1e294bcf
-
SHA256
5ff4c3eb0ad5b96bf4f88fa2a99b2589275daebca86e03f904767221839dff63
-
SHA512
6e402ec98ca7e5fe0062f017a08832966c28db14b80b0bad2f324915e1cd42e97ed69ab0c3a52fd44d84052eeb4f83c011b349c9d17897e2f4acd42ee384d1a8
-
SSDEEP
12288:EY1FQqDi5HYIsMzxlyvODj0Ihz9/vNRWLLeyFNeMr+8pbnaeDAdp:V1mvNsqqwl+Ln2Mr+YzaSWp
Static task
static1
Behavioral task
behavioral1
Sample
5ff4c3eb0ad5b96bf4f88fa2a99b2589275daebca86e03f904767221839dff63.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5ff4c3eb0ad5b96bf4f88fa2a99b2589275daebca86e03f904767221839dff63.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5169304639:AAEuGpfCL-hv_A-RdB_r9uRMHt_yvJZb2Z8/
Targets
-
-
Target
5ff4c3eb0ad5b96bf4f88fa2a99b2589275daebca86e03f904767221839dff63
-
Size
1.0MB
-
MD5
0ab4a2ab713a752c61f722baa1af6064
-
SHA1
c2da9dbb319b92a4179e6a3a9a8763cd1e294bcf
-
SHA256
5ff4c3eb0ad5b96bf4f88fa2a99b2589275daebca86e03f904767221839dff63
-
SHA512
6e402ec98ca7e5fe0062f017a08832966c28db14b80b0bad2f324915e1cd42e97ed69ab0c3a52fd44d84052eeb4f83c011b349c9d17897e2f4acd42ee384d1a8
-
SSDEEP
12288:EY1FQqDi5HYIsMzxlyvODj0Ihz9/vNRWLLeyFNeMr+8pbnaeDAdp:V1mvNsqqwl+Ln2Mr+YzaSWp
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-