General
-
Target
5058d993163b6a49d2fa6b102c03da4217787bbb50026e84d111f85cf0241219
-
Size
776KB
-
Sample
230608-pebfgafh3z
-
MD5
46610a28dcd9f71fbcdecf628c0142db
-
SHA1
d06bfec4542e700e48b8461dff345978ac271f87
-
SHA256
5058d993163b6a49d2fa6b102c03da4217787bbb50026e84d111f85cf0241219
-
SHA512
ddd743ad62f0e3e484497428c3414f35a0a2fdc4a61fd3e2f78860d244c9a697416493987636de0fac77eb12962261721fe6436c58cbaa22f81b74e10ce35d73
-
SSDEEP
24576:JgPLaVUH999oAUUiUQLGE8HfOua5PYA5UDp:sBH9bqGE8/Odwv
Static task
static1
Behavioral task
behavioral1
Sample
5058d993163b6a49d2fa6b102c03da4217787bbb50026e84d111f85cf0241219.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5058d993163b6a49d2fa6b102c03da4217787bbb50026e84d111f85cf0241219.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5473903116:AAH0COryXTO6kCeNjQRiy6Z66WJsa9yts6c/
Targets
-
-
Target
5058d993163b6a49d2fa6b102c03da4217787bbb50026e84d111f85cf0241219
-
Size
776KB
-
MD5
46610a28dcd9f71fbcdecf628c0142db
-
SHA1
d06bfec4542e700e48b8461dff345978ac271f87
-
SHA256
5058d993163b6a49d2fa6b102c03da4217787bbb50026e84d111f85cf0241219
-
SHA512
ddd743ad62f0e3e484497428c3414f35a0a2fdc4a61fd3e2f78860d244c9a697416493987636de0fac77eb12962261721fe6436c58cbaa22f81b74e10ce35d73
-
SSDEEP
24576:JgPLaVUH999oAUUiUQLGE8HfOua5PYA5UDp:sBH9bqGE8/Odwv
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-