General
-
Target
166321f2bf53cab5d536489d145e913c75727473627922b9ce53e0dd8b40e99d
-
Size
647KB
-
Sample
230608-mbn62seg31
-
MD5
22e7f21b0d8c6bed12ccc4d1d9fcfb21
-
SHA1
fadc4a581a932577f69ea323c3b440ce356e0500
-
SHA256
166321f2bf53cab5d536489d145e913c75727473627922b9ce53e0dd8b40e99d
-
SHA512
0ebde3ecdafd5307a3bdacaf175ece7944cc9b852afbe8ff1fe3a0c10070e1a3b3f64c437f6a5e04001cacdf0f2bc3d7756985c33a4ff2c187c84beb55006934
-
SSDEEP
6144:OofPu45yDwEtTaGvrsu/S2lYYa2eKXMXW+yZwqvso4y1eHdLGADzeOC397dvGoN4:OofmgYppYm+yyc093Dz4EkojJk9
Static task
static1
Behavioral task
behavioral1
Sample
166321f2bf53cab5d536489d145e913c75727473627922b9ce53e0dd8b40e99d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
166321f2bf53cab5d536489d145e913c75727473627922b9ce53e0dd8b40e99d.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6174413593:AAEFJFfmmgKHkg-43MZw2Pt5EAT6z2Bs9Ug/
Targets
-
-
Target
166321f2bf53cab5d536489d145e913c75727473627922b9ce53e0dd8b40e99d
-
Size
647KB
-
MD5
22e7f21b0d8c6bed12ccc4d1d9fcfb21
-
SHA1
fadc4a581a932577f69ea323c3b440ce356e0500
-
SHA256
166321f2bf53cab5d536489d145e913c75727473627922b9ce53e0dd8b40e99d
-
SHA512
0ebde3ecdafd5307a3bdacaf175ece7944cc9b852afbe8ff1fe3a0c10070e1a3b3f64c437f6a5e04001cacdf0f2bc3d7756985c33a4ff2c187c84beb55006934
-
SSDEEP
6144:OofPu45yDwEtTaGvrsu/S2lYYa2eKXMXW+yZwqvso4y1eHdLGADzeOC397dvGoN4:OofmgYppYm+yyc093Dz4EkojJk9
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-