General
-
Target
1d4517cd1fed529f9080fa890d99fbe96bec32213c9cfa6117054ada423ea8ff
-
Size
907KB
-
Sample
230312-tagh5sed57
-
MD5
1e0582346d91496aa60ff524e9ad7408
-
SHA1
4b8c3bd5cbc31b87087dca71f2dfc3bec4341512
-
SHA256
1d4517cd1fed529f9080fa890d99fbe96bec32213c9cfa6117054ada423ea8ff
-
SHA512
26d007f4c7df1f05f81e149f22e9daab424e3d5c465018b1430281d3204f99395ac899dc07b92942a6f764904f38d31334a596faa31d462be502f45d1f30911d
-
SSDEEP
24576:/1Qwe3cOQAn7tnqI4yuz+jvVb1kWviYsL4/5OUh0nf:/BGZqOu01kDbs/5O+0
Static task
static1
Behavioral task
behavioral1
Sample
1d4517cd1fed529f9080fa890d99fbe96bec32213c9cfa6117054ada423ea8ff.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1d4517cd1fed529f9080fa890d99fbe96bec32213c9cfa6117054ada423ea8ff.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5350270151:AAHiqzi7CQnEGEk3Xi-PyJX8ov0x6B-8S1I/
Targets
-
-
Target
1d4517cd1fed529f9080fa890d99fbe96bec32213c9cfa6117054ada423ea8ff
-
Size
907KB
-
MD5
1e0582346d91496aa60ff524e9ad7408
-
SHA1
4b8c3bd5cbc31b87087dca71f2dfc3bec4341512
-
SHA256
1d4517cd1fed529f9080fa890d99fbe96bec32213c9cfa6117054ada423ea8ff
-
SHA512
26d007f4c7df1f05f81e149f22e9daab424e3d5c465018b1430281d3204f99395ac899dc07b92942a6f764904f38d31334a596faa31d462be502f45d1f30911d
-
SSDEEP
24576:/1Qwe3cOQAn7tnqI4yuz+jvVb1kWviYsL4/5OUh0nf:/BGZqOu01kDbs/5O+0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-