General
-
Target
779a609fb967044a625ac9771921cdbcd4f07991f407014a1576e092826f11ec.exe
-
Size
169KB
-
Sample
230607-vk87ksdc86
-
MD5
0e23f6a471c0f39414af71b7686b2c67
-
SHA1
a90d94279f98ec0c36239d907e502a9875d6cdce
-
SHA256
779a609fb967044a625ac9771921cdbcd4f07991f407014a1576e092826f11ec
-
SHA512
e4417275bb1c3ee968b02179b2e2375342c1d6ba2fc11f45b5564b992ebfb159a19dbabbb8fc788f83b69535f7baa1bef740ade88a26aa98c6841c4654eddc1d
-
SSDEEP
3072:AMAPTaigq3ohKxW5k4i2yuN/xadpMNSLx0R9Rhv2ExjOEup6:AMAGoU5kn8adUOxcB2jD
Behavioral task
behavioral1
Sample
779a609fb967044a625ac9771921cdbcd4f07991f407014a1576e092826f11ec.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
779a609fb967044a625ac9771921cdbcd4f07991f407014a1576e092826f11ec.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1102722564712841296/3-EpoUbqBExsjHTlAszTcqqS1MRQ8Tai6WQXR4RQMFNg3cR9b8adTdUAL_l__l4PCJKc
Targets
-
-
Target
779a609fb967044a625ac9771921cdbcd4f07991f407014a1576e092826f11ec.exe
-
Size
169KB
-
MD5
0e23f6a471c0f39414af71b7686b2c67
-
SHA1
a90d94279f98ec0c36239d907e502a9875d6cdce
-
SHA256
779a609fb967044a625ac9771921cdbcd4f07991f407014a1576e092826f11ec
-
SHA512
e4417275bb1c3ee968b02179b2e2375342c1d6ba2fc11f45b5564b992ebfb159a19dbabbb8fc788f83b69535f7baa1bef740ade88a26aa98c6841c4654eddc1d
-
SSDEEP
3072:AMAPTaigq3ohKxW5k4i2yuN/xadpMNSLx0R9Rhv2ExjOEup6:AMAGoU5kn8adUOxcB2jD
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-