General
-
Target
58173548c2124b6a23d02762e8699b9bb1d8f7fdc2b4365a7c1f97ab8639c1d8.exe
-
Size
165KB
-
Sample
230308-ncjtdsfg55
-
MD5
c89482b360023c802773f550e0671489
-
SHA1
b8e5d08eea312845e27c1d3265f5288ee1482135
-
SHA256
58173548c2124b6a23d02762e8699b9bb1d8f7fdc2b4365a7c1f97ab8639c1d8
-
SHA512
69417420c3071fd32109309c5e33a4a3382942aaae082b0c44fa9297ed7f1a3d08cd4a0c600270c17e02f6bed262da5bfe87b3ded4dc539e400d4569e3968f79
-
SSDEEP
3072:Kp2L5ogpd5Da12y34BNNjwux3IuN0FnMXrkKscKH59T:hogp7DALo5ZMFUuPZ9
Behavioral task
behavioral1
Sample
58173548c2124b6a23d02762e8699b9bb1d8f7fdc2b4365a7c1f97ab8639c1d8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
58173548c2124b6a23d02762e8699b9bb1d8f7fdc2b4365a7c1f97ab8639c1d8.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1075033485355532409/PY03RC_LVWgPfEYGLd-dVemJoNpFdo5fMfDCmfTCn0S_o4ousPDz3eraWhreCcHqEMSn
Targets
-
-
Target
58173548c2124b6a23d02762e8699b9bb1d8f7fdc2b4365a7c1f97ab8639c1d8.exe
-
Size
165KB
-
MD5
c89482b360023c802773f550e0671489
-
SHA1
b8e5d08eea312845e27c1d3265f5288ee1482135
-
SHA256
58173548c2124b6a23d02762e8699b9bb1d8f7fdc2b4365a7c1f97ab8639c1d8
-
SHA512
69417420c3071fd32109309c5e33a4a3382942aaae082b0c44fa9297ed7f1a3d08cd4a0c600270c17e02f6bed262da5bfe87b3ded4dc539e400d4569e3968f79
-
SSDEEP
3072:Kp2L5ogpd5Da12y34BNNjwux3IuN0FnMXrkKscKH59T:hogp7DALo5ZMFUuPZ9
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-