General
-
Target
ebba07aa50ddef78d9686de42b4db3dc.bin
-
Size
498KB
-
Sample
230419-cra91she6v
-
MD5
7829db7a196907583de00f86c11de131
-
SHA1
41962cd29d3d43afa03b1f92ff8997cf28d23962
-
SHA256
10ac73fe223456e4b0b42d8c4e9bd628910246e1f40b7303611105b3db0bb94e
-
SHA512
75d0e096f110ec1e16e570cead66984b9629c3150aa06deda65ec8041ca0ce6a3ac5f07a1b89e37a1f85f98055fa66a85cd25d999f71aef2f58a366001b6a7ae
-
SSDEEP
12288:sFq3BhKhLwyKIMThZpNx1+9hMjVs44U+oet/17/+4vi7:sF+hKFwJFZp10wh4UAtdr+kS
Static task
static1
Behavioral task
behavioral1
Sample
d5d18f9417c9f5268a707e6c276d8318f0bc399302ff07d8d8319257c9dac063.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d5d18f9417c9f5268a707e6c276d8318f0bc399302ff07d8d8319257c9dac063.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6191932863:AAEw6WZfMHSbIiilSKsmAnJOgaZwvnoMVh8/
Targets
-
-
Target
d5d18f9417c9f5268a707e6c276d8318f0bc399302ff07d8d8319257c9dac063.exe
-
Size
562KB
-
MD5
ebba07aa50ddef78d9686de42b4db3dc
-
SHA1
8060a6eb32751bf7d909e0e5d25094a9c8fd7bbd
-
SHA256
d5d18f9417c9f5268a707e6c276d8318f0bc399302ff07d8d8319257c9dac063
-
SHA512
9e3f8656d4eb07f4c6ef38d1c570c8ee66e7123f67cbf6bf0ae833dcfd66f8841bcaa653a5f4ffd7c4176992751490fb32f9dd31a196a9379c7a075f2e4a4f12
-
SSDEEP
12288:JAOvIzAPbIs69NzYDdGi3y9p2L7iDu6pgbeSHtXqjfXiLsHiJI:JAC356X8DdhiT2UuTJHtAfXiVI
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-