General
-
Target
643a5f5c2522976a646e7f6129494937.bin
-
Size
569KB
-
Sample
230511-b2v7habb24
-
MD5
7343dea5d21afc6043b724bc94462fdf
-
SHA1
10325f1bb670bcfe68349b0ac2b8bc64d6a23f64
-
SHA256
4e386dbbbe2dcb83e680b0e28750318b9d8db872419787e2a569da09571cdf9d
-
SHA512
ec46dfde06176bae0ba269ebf41621b5f24185b9ea4236d0a18f480a76ebabe08f1e1a381632da9b65e39e413798d597d2caea683855dff6615c2d1d88400810
-
SSDEEP
12288:gf9lIXtGuhtzdOfbzBuhmrryQQgq5MunMq4Omfu7NcSUaLBUwIhwv9pi:gfHIXtDh9dGbzBKmqQQYunYOmW7TTi
Static task
static1
Behavioral task
behavioral1
Sample
529bb27de4876e215a65d62f1166d244bf8d16396a4cae982af3900260bd68e9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
529bb27de4876e215a65d62f1166d244bf8d16396a4cae982af3900260bd68e9.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6146448630:AAFDNJNL6_ijRm3JFXG4wLYsktTk9DjETWM/
Targets
-
-
Target
529bb27de4876e215a65d62f1166d244bf8d16396a4cae982af3900260bd68e9.exe
-
Size
694KB
-
MD5
643a5f5c2522976a646e7f6129494937
-
SHA1
bd6eb5576677df1727cf6faf8a578ea7fd07be0d
-
SHA256
529bb27de4876e215a65d62f1166d244bf8d16396a4cae982af3900260bd68e9
-
SHA512
961ad6608c1b35c1eb2649b2199e1da629291e7ffaa6ba957151779313441713ef1c22903df5a2e498682a56ad6b69d1c798039184a9e6847f506612d6bc9ca8
-
SSDEEP
12288:qPOAAZf7AkNriQ6utjxgm8ozBqMi9qjjWaCreqJE9bGa+I104cO:q2kil6utdd8ozZ4VreeIbGan04z
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-