General
-
Target
cb1da5d39bfc177d4ae22ec62737c655.exe
-
Size
640KB
-
Sample
230524-s5bqpsdf6x
-
MD5
cb1da5d39bfc177d4ae22ec62737c655
-
SHA1
3d914005d219d311a713a71d90e3060b8f187025
-
SHA256
893870940f0b3f56d46f71effcd3cc731607154214f1ba956f54f50b5a4134dd
-
SHA512
c3967ad3e81e92d5e5fb37d6be2c6dd359850844461dd54cbb9a6182d7c9da9ca297086f6d3157652d66ab3918b8d5c40f19ace8009ccaf0317a563ab9da05be
-
SSDEEP
12288:K2N8jiZ4zypIPs6tPplTY6RhKuX/MiJ3PctxhYXbyrBJ/1P+SIW7InGD6VWx6Axl:K2N8jiZ4zypIPs6JTDE6EiJkGXerB1NH
Static task
static1
Behavioral task
behavioral1
Sample
cb1da5d39bfc177d4ae22ec62737c655.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cb1da5d39bfc177d4ae22ec62737c655.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1105328307010015232/y3JHG4bp0jeynHE4DQgvB8OX8QijYxrk2CH91SY0HvNfeBptAktLBqo7Ix-7GllXk9Gz
Targets
-
-
Target
cb1da5d39bfc177d4ae22ec62737c655.exe
-
Size
640KB
-
MD5
cb1da5d39bfc177d4ae22ec62737c655
-
SHA1
3d914005d219d311a713a71d90e3060b8f187025
-
SHA256
893870940f0b3f56d46f71effcd3cc731607154214f1ba956f54f50b5a4134dd
-
SHA512
c3967ad3e81e92d5e5fb37d6be2c6dd359850844461dd54cbb9a6182d7c9da9ca297086f6d3157652d66ab3918b8d5c40f19ace8009ccaf0317a563ab9da05be
-
SSDEEP
12288:K2N8jiZ4zypIPs6tPplTY6RhKuX/MiJ3PctxhYXbyrBJ/1P+SIW7InGD6VWx6Axl:K2N8jiZ4zypIPs6JTDE6EiJkGXerB1NH
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-