General
-
Target
01958599.exe
-
Size
716KB
-
Sample
230526-h7y9nsec87
-
MD5
971fcae02ecab66b5d8e9bf0603a8c75
-
SHA1
a1de4fe698673ff100bffed0fcba2db98e683567
-
SHA256
f9d49ba395212bc46444ac00546a04c8da9b251ce103adf52d9c80be61f6348c
-
SHA512
f94805781cb7df0ebf67af23d08a4ed7d47ffc4a0e54b8b55a8178241793c4bf4311f866b83c98866635b1ecb0a31101e7034d384e2d408595676bac925377cb
-
SSDEEP
12288:LBbmzZBEP85o4Y1yh9uxPuce1Dua0va/g2s8gJ7rUUUQo0JOAxQfl0yCByIQpD:09BEP8tvDB9YzTMc8CB5Q
Static task
static1
Behavioral task
behavioral1
Sample
01958599.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
01958599.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5473903116:AAH0COryXTO6kCeNjQRiy6Z66WJsa9yts6c/
Targets
-
-
Target
01958599.exe
-
Size
716KB
-
MD5
971fcae02ecab66b5d8e9bf0603a8c75
-
SHA1
a1de4fe698673ff100bffed0fcba2db98e683567
-
SHA256
f9d49ba395212bc46444ac00546a04c8da9b251ce103adf52d9c80be61f6348c
-
SHA512
f94805781cb7df0ebf67af23d08a4ed7d47ffc4a0e54b8b55a8178241793c4bf4311f866b83c98866635b1ecb0a31101e7034d384e2d408595676bac925377cb
-
SSDEEP
12288:LBbmzZBEP85o4Y1yh9uxPuce1Dua0va/g2s8gJ7rUUUQo0JOAxQfl0yCByIQpD:09BEP8tvDB9YzTMc8CB5Q
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-