General
-
Target
P30OwbdhQCNt5HS.exe
-
Size
698KB
-
Sample
230504-htzy2scd7x
-
MD5
43678482751038f9a87f50b0dc8e2f15
-
SHA1
2735a27a9ba8de920eca46637c974b686bc2d20b
-
SHA256
109ef5c322e2f5b9624f14914d4e4db3cd2ee7883f9c718c913616eb69277091
-
SHA512
4ebaae9d12e72102fcbe374edd0f880e041485a3ccc802cee17c145ddf4ce7f221fc06a736b1a0096081b0bb9d854f6ef4699ab41424287a2be9060249865b46
-
SSDEEP
12288:1BAni4Iyett3RbH/ZvlydI1tWHURMcSRV9ZUasth5KwQyX:1aWtxH/ZttRq9ZSK
Static task
static1
Behavioral task
behavioral1
Sample
P30OwbdhQCNt5HS.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
P30OwbdhQCNt5HS.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6190932047:AAFAXC_q-J_1tPTmmiqndMdlZipgoGT2Ypo/
Targets
-
-
Target
P30OwbdhQCNt5HS.exe
-
Size
698KB
-
MD5
43678482751038f9a87f50b0dc8e2f15
-
SHA1
2735a27a9ba8de920eca46637c974b686bc2d20b
-
SHA256
109ef5c322e2f5b9624f14914d4e4db3cd2ee7883f9c718c913616eb69277091
-
SHA512
4ebaae9d12e72102fcbe374edd0f880e041485a3ccc802cee17c145ddf4ce7f221fc06a736b1a0096081b0bb9d854f6ef4699ab41424287a2be9060249865b46
-
SSDEEP
12288:1BAni4Iyett3RbH/ZvlydI1tWHURMcSRV9ZUasth5KwQyX:1aWtxH/ZttRq9ZSK
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-