General
-
Target
cc6fffaf71e09873cabc2fc43aebf73c9fa2a3906c86c15bc0d96c5a0975ab5e
-
Size
642KB
-
Sample
230823-mc25asch4x
-
MD5
7f457113c6d2f93228f5dec68d6a050d
-
SHA1
1b1f49f4fa26862a5e05fb699afd433d24d8277e
-
SHA256
cc6fffaf71e09873cabc2fc43aebf73c9fa2a3906c86c15bc0d96c5a0975ab5e
-
SHA512
c8cb232e264f9a99901cb14b4495e4eea73e2b76a49cbee40c6ff185bfd121b48c3a609b301646b39ccaa8be665e369843c9d650b9d2ef7e700e12b48d5084ac
-
SSDEEP
12288:KGHJqOwAambVKebzKLajPBeAk6eTThaUk8BeRLkV6uHu1VlKwbuptSkoWl:DpqUaQzKejBeV6MThauBu2ruHlNbgtSG
Static task
static1
Behavioral task
behavioral1
Sample
iMKDVrJe47zuAdF.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
iMKDVrJe47zuAdF.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1139484107194249226/Vlhp6hn2jQbp2Pn9C7HitXwMubSUxt8jvVmjiMzLvA0UTXInxNbf6E9L7WA2v5GWOb49
Targets
-
-
Target
iMKDVrJe47zuAdF.exe
-
Size
727KB
-
MD5
5632023035bb33557273fffb47cf484e
-
SHA1
3a9019e6d4b424ea0872962e4bdfe102454efb18
-
SHA256
68de9e3489ae10b2585b442b3cb29c33928e0e874c96d82a9ec16db2f2ecf83a
-
SHA512
531b99e8ea60c7c32dface14dcd3951034779eac8f8e0e01acf7106fdba7aca6872196ee9d7ff37d7dfacc0c698249bdbc62229093cfaacdcb0f16f9b49590b9
-
SSDEEP
12288:8dfSRtR2lq3PagfabD3GFzj3wmGBlaU6eTT/wUu8/shLkf6uHu1VlK/0dKKgwxk+:8s2lq3ya+OzjRGBlh6MT/ww/+WruHl8N
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-