General
-
Target
1a53c645d8a4df7f6cd796b426512ff27cbb40988b73248e6feb8a8a498b9532.exe
-
Size
1.0MB
-
Sample
230106-qdr79sca8t
-
MD5
87bcb7dc95d3d9ddf01fb453b3e96824
-
SHA1
31a6f0e2ac4e4e44795991b9ae5de3ac21f3c66a
-
SHA256
1a53c645d8a4df7f6cd796b426512ff27cbb40988b73248e6feb8a8a498b9532
-
SHA512
59d57789312d6e1d4db962956b0b69ce576bcb07bacf275a3694f9fe624aedab373a57236e3791d07f95661582b28ca5b797f861e973b60e9d0354ea127fe11f
-
SSDEEP
12288:nt2iN1/Sr+peUv5KDl+mX/bMh2O5jCaCMJaBc4rCeijhJ0KSl+jO3H8c+9eFf+mu:nt1e+lgRTMhh3CMJaNmei9UsjO3H80
Static task
static1
Behavioral task
behavioral1
Sample
1a53c645d8a4df7f6cd796b426512ff27cbb40988b73248e6feb8a8a498b9532.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1a53c645d8a4df7f6cd796b426512ff27cbb40988b73248e6feb8a8a498b9532.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5940813834:AAF8mKehOQ2jtgluy4NISP8DYRvxgz__xCQ/
Targets
-
-
Target
1a53c645d8a4df7f6cd796b426512ff27cbb40988b73248e6feb8a8a498b9532.exe
-
Size
1.0MB
-
MD5
87bcb7dc95d3d9ddf01fb453b3e96824
-
SHA1
31a6f0e2ac4e4e44795991b9ae5de3ac21f3c66a
-
SHA256
1a53c645d8a4df7f6cd796b426512ff27cbb40988b73248e6feb8a8a498b9532
-
SHA512
59d57789312d6e1d4db962956b0b69ce576bcb07bacf275a3694f9fe624aedab373a57236e3791d07f95661582b28ca5b797f861e973b60e9d0354ea127fe11f
-
SSDEEP
12288:nt2iN1/Sr+peUv5KDl+mX/bMh2O5jCaCMJaBc4rCeijhJ0KSl+jO3H8c+9eFf+mu:nt1e+lgRTMhh3CMJaNmei9UsjO3H80
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-