General
-
Target
d56ba2672bfa8213ab455b55390a2aeedb764811d8c469c908cf74306083a176
-
Size
886KB
-
Sample
221125-a41dkaae74
-
MD5
fb2460989cde8797df96db870647fedb
-
SHA1
b50a57ca9f6f71ef56687f6ca801ba3f81ffc14f
-
SHA256
d56ba2672bfa8213ab455b55390a2aeedb764811d8c469c908cf74306083a176
-
SHA512
d9e5a19139a61e64660b242e2703134c5b2fcdb00a576a668f821431e0c5b48e6d61801fa6b37935fc34438ac29bb500b73a3db586b4b1517e90934cb4f20728
-
SSDEEP
12288:yBfrmZJbxpDFHnhzAMiVsp5Ei/IruoYWykNoaLC3am2na4qfzEkvDp1Q/aQTn9Go:yBz0hz8C/Ickqa2PD4qAqpMGdAWC
Static task
static1
Behavioral task
behavioral1
Sample
d56ba2672bfa8213ab455b55390a2aeedb764811d8c469c908cf74306083a176.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5603599252:AAFMdBzOyqWZ9kTMnZ7mBvML6rVOBz2Xfdk/
Targets
-
-
Target
d56ba2672bfa8213ab455b55390a2aeedb764811d8c469c908cf74306083a176
-
Size
886KB
-
MD5
fb2460989cde8797df96db870647fedb
-
SHA1
b50a57ca9f6f71ef56687f6ca801ba3f81ffc14f
-
SHA256
d56ba2672bfa8213ab455b55390a2aeedb764811d8c469c908cf74306083a176
-
SHA512
d9e5a19139a61e64660b242e2703134c5b2fcdb00a576a668f821431e0c5b48e6d61801fa6b37935fc34438ac29bb500b73a3db586b4b1517e90934cb4f20728
-
SSDEEP
12288:yBfrmZJbxpDFHnhzAMiVsp5Ei/IruoYWykNoaLC3am2na4qfzEkvDp1Q/aQTn9Go:yBz0hz8C/Ickqa2PD4qAqpMGdAWC
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-