General
-
Target
d67c1189b6abb48e8928dcf36705cc93589011229ee2a4506263ed725f9664cc.exe
-
Size
776KB
-
Sample
230705-mfylaabe68
-
MD5
6b15b2f47bb5e4a31685156b1f34e866
-
SHA1
7c750b4e6048f4464db356c5255dbc79c960764a
-
SHA256
d67c1189b6abb48e8928dcf36705cc93589011229ee2a4506263ed725f9664cc
-
SHA512
b3676a465b603379af59b90035f16c7de7abe9e9314f4281edde76872bc340f19113437194173d46ebf3a8a408ec163abd23fde4a5db0191e40afdc934b9e509
-
SSDEEP
12288:QoAcuF6mn1DHLZnvJf0KiOe42KMu/N3mWhQmwmJCMpUM94qdafcdu7nu+BUVmkyG:eiOV/NOa+fu+BUVmFU7Mcy34EJBM
Static task
static1
Behavioral task
behavioral1
Sample
d67c1189b6abb48e8928dcf36705cc93589011229ee2a4506263ed725f9664cc.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
d67c1189b6abb48e8928dcf36705cc93589011229ee2a4506263ed725f9664cc.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5480024987:AAEOw0FrXbZvPh7UKydmAyaZODSJd4PSlkU/
Targets
-
-
Target
d67c1189b6abb48e8928dcf36705cc93589011229ee2a4506263ed725f9664cc.exe
-
Size
776KB
-
MD5
6b15b2f47bb5e4a31685156b1f34e866
-
SHA1
7c750b4e6048f4464db356c5255dbc79c960764a
-
SHA256
d67c1189b6abb48e8928dcf36705cc93589011229ee2a4506263ed725f9664cc
-
SHA512
b3676a465b603379af59b90035f16c7de7abe9e9314f4281edde76872bc340f19113437194173d46ebf3a8a408ec163abd23fde4a5db0191e40afdc934b9e509
-
SSDEEP
12288:QoAcuF6mn1DHLZnvJf0KiOe42KMu/N3mWhQmwmJCMpUM94qdafcdu7nu+BUVmkyG:eiOV/NOa+fu+BUVmFU7Mcy34EJBM
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-