General
-
Target
8ccbf1ed960f1c8d93be2abbb9b7228a156c64b82ad258458e596226aaf6c95c.exe
-
Size
347KB
-
Sample
221211-cc247abb3s
-
MD5
971b0cc850794850607ece60e62da848
-
SHA1
e717ebba195c641533dc4cd704fb59b001804a97
-
SHA256
8ccbf1ed960f1c8d93be2abbb9b7228a156c64b82ad258458e596226aaf6c95c
-
SHA512
960faa4b0b90afe5c6b44ebeb2a83c6702c643ef4ebfc5802bc344d96bd456d314a63fa3a4aa786b4e3dc04523c0a7a2dc6636d05e6f986d1d10e0964a359386
-
SSDEEP
6144:9kwI5mH2y25AOzOGP4d4ndG/UXkR6Z3+6xeZPgw9ceD2bSDs:U5N3zOGQh/UXkRi+sAFceEss
Static task
static1
Behavioral task
behavioral1
Sample
8ccbf1ed960f1c8d93be2abbb9b7228a156c64b82ad258458e596226aaf6c95c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8ccbf1ed960f1c8d93be2abbb9b7228a156c64b82ad258458e596226aaf6c95c.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5801961827:AAHU2YhkfiXQwgVf7WnbO6mcJG_3zpTOec4/
Targets
-
-
Target
8ccbf1ed960f1c8d93be2abbb9b7228a156c64b82ad258458e596226aaf6c95c.exe
-
Size
347KB
-
MD5
971b0cc850794850607ece60e62da848
-
SHA1
e717ebba195c641533dc4cd704fb59b001804a97
-
SHA256
8ccbf1ed960f1c8d93be2abbb9b7228a156c64b82ad258458e596226aaf6c95c
-
SHA512
960faa4b0b90afe5c6b44ebeb2a83c6702c643ef4ebfc5802bc344d96bd456d314a63fa3a4aa786b4e3dc04523c0a7a2dc6636d05e6f986d1d10e0964a359386
-
SSDEEP
6144:9kwI5mH2y25AOzOGP4d4ndG/UXkR6Z3+6xeZPgw9ceD2bSDs:U5N3zOGQh/UXkRi+sAFceEss
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-