General
-
Target
a41a510e1b3347f7d73eef2ba37cc1b2345cb77f8063e5632af9695ead6f36be
-
Size
266KB
-
Sample
230808-q2vnased81
-
MD5
27082c3c39a5676feb8bd06259a62986
-
SHA1
3b71575eb1f20d9891193f22cbc48c0c2ebf3006
-
SHA256
a41a510e1b3347f7d73eef2ba37cc1b2345cb77f8063e5632af9695ead6f36be
-
SHA512
b2aa0a323e2d26cb754941d8a003d3718b0f3fbf9fbc0efad202984d91a8d4d496a73ab617a000dcc82c90210ab78670ca8edcc538ba1f9d6a7644dae54ea336
-
SSDEEP
6144:vYa6nu8pnYbVHcHyhjGW7gyCW6Ao0DyAYXN/OLa/TX:vY9u8pYhHwEjGwgDW+N/ca/TX
Static task
static1
Behavioral task
behavioral1
Sample
a41a510e1b3347f7d73eef2ba37cc1b2345cb77f8063e5632af9695ead6f36be.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a41a510e1b3347f7d73eef2ba37cc1b2345cb77f8063e5632af9695ead6f36be.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5332188518:AAGLqzDNvYFhN8XTUFMm6M56kO3XMfpkjIw/
Targets
-
-
Target
a41a510e1b3347f7d73eef2ba37cc1b2345cb77f8063e5632af9695ead6f36be
-
Size
266KB
-
MD5
27082c3c39a5676feb8bd06259a62986
-
SHA1
3b71575eb1f20d9891193f22cbc48c0c2ebf3006
-
SHA256
a41a510e1b3347f7d73eef2ba37cc1b2345cb77f8063e5632af9695ead6f36be
-
SHA512
b2aa0a323e2d26cb754941d8a003d3718b0f3fbf9fbc0efad202984d91a8d4d496a73ab617a000dcc82c90210ab78670ca8edcc538ba1f9d6a7644dae54ea336
-
SSDEEP
6144:vYa6nu8pnYbVHcHyhjGW7gyCW6Ao0DyAYXN/OLa/TX:vY9u8pYhHwEjGwgDW+N/ca/TX
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-