General
-
Target
591e486f7e4431a0be2cd22abd2c4ad9c97f4eeaf8a387ef816fa32e15b267ce
-
Size
837KB
-
Sample
221206-j97jhaaa26
-
MD5
5b0b65b9ad793f8d127a90f7f31e8d39
-
SHA1
6a7ede3e8f6064ec1a0b0ddaf97887d8d3567fe3
-
SHA256
591e486f7e4431a0be2cd22abd2c4ad9c97f4eeaf8a387ef816fa32e15b267ce
-
SHA512
ec31b35402802af0ec85035071ddd66921d02a98d7b385cc3e8a727c1b6a1d4aa948d02cb6accb54ef346b166b5ee7fea855ef35f8017d449d89c96939f7e4df
-
SSDEEP
12288:Fc3fYBSWcVlcLOaYKzqCig4fVTMHPKX3QPKvjma/gKZ/nXt7virmWhlGLaQYI:egBiqOaZzxigO5MCQPKr
Static task
static1
Behavioral task
behavioral1
Sample
591e486f7e4431a0be2cd22abd2c4ad9c97f4eeaf8a387ef816fa32e15b267ce.exe
Resource
win10-20220812-en
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1048308947817353288/5ypgS4XmSt1xW_MYhzjePp8jxnOIkdnEO0OTccrP0m7sB3ynEyezAUtrX-js6a4kTsJ8
Targets
-
-
Target
591e486f7e4431a0be2cd22abd2c4ad9c97f4eeaf8a387ef816fa32e15b267ce
-
Size
837KB
-
MD5
5b0b65b9ad793f8d127a90f7f31e8d39
-
SHA1
6a7ede3e8f6064ec1a0b0ddaf97887d8d3567fe3
-
SHA256
591e486f7e4431a0be2cd22abd2c4ad9c97f4eeaf8a387ef816fa32e15b267ce
-
SHA512
ec31b35402802af0ec85035071ddd66921d02a98d7b385cc3e8a727c1b6a1d4aa948d02cb6accb54ef346b166b5ee7fea855ef35f8017d449d89c96939f7e4df
-
SSDEEP
12288:Fc3fYBSWcVlcLOaYKzqCig4fVTMHPKX3QPKvjma/gKZ/nXt7virmWhlGLaQYI:egBiqOaZzxigO5MCQPKr
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-