General
-
Target
c926c9812327ced09a6279f86abce7caecb49c8d53abd7c901d5267b8d07b487.exe
-
Size
727KB
-
Sample
230403-qy4f2afa97
-
MD5
0aa7526a87d723ef44760f584ca44cba
-
SHA1
1e24b3a2ee21c9797962114d53d9c90e2d77b6f4
-
SHA256
c926c9812327ced09a6279f86abce7caecb49c8d53abd7c901d5267b8d07b487
-
SHA512
9ffc440ffb53005e3e7958f47567ac51dc9efc3ea8bb1ca1f3d2be3f336c1a5df88644a3c93d22ac3c8a1e4cfd6581a41cc014335aa0dc3dbcaf3dcea8723e81
-
SSDEEP
12288:ZsQmYMUnFW/NybLDYCrmRUwl2wu6a/nErnoSslVZXlW66gqmTe0oEmpInOwW7yzf:ZsQUEvDY1Uwl2pL/nenoSIVZA/gcHEJL
Static task
static1
Behavioral task
behavioral1
Sample
c926c9812327ced09a6279f86abce7caecb49c8d53abd7c901d5267b8d07b487.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c926c9812327ced09a6279f86abce7caecb49c8d53abd7c901d5267b8d07b487.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6174413593:AAEFJFfmmgKHkg-43MZw2Pt5EAT6z2Bs9Ug/
Targets
-
-
Target
c926c9812327ced09a6279f86abce7caecb49c8d53abd7c901d5267b8d07b487.exe
-
Size
727KB
-
MD5
0aa7526a87d723ef44760f584ca44cba
-
SHA1
1e24b3a2ee21c9797962114d53d9c90e2d77b6f4
-
SHA256
c926c9812327ced09a6279f86abce7caecb49c8d53abd7c901d5267b8d07b487
-
SHA512
9ffc440ffb53005e3e7958f47567ac51dc9efc3ea8bb1ca1f3d2be3f336c1a5df88644a3c93d22ac3c8a1e4cfd6581a41cc014335aa0dc3dbcaf3dcea8723e81
-
SSDEEP
12288:ZsQmYMUnFW/NybLDYCrmRUwl2wu6a/nErnoSslVZXlW66gqmTe0oEmpInOwW7yzf:ZsQUEvDY1Uwl2pL/nenoSIVZA/gcHEJL
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-