General
-
Target
NEAS.077017e5f92ab767447cc02a7017d126fc06e048811da11bb3956eac353e576aexe_JC.exe
-
Size
646KB
-
Sample
231023-tkykeabg34
-
MD5
0bcd514d7e2d45de7bb8dea8d717617f
-
SHA1
9e058117755853bce0e80f0e44c91d00bb733e94
-
SHA256
077017e5f92ab767447cc02a7017d126fc06e048811da11bb3956eac353e576a
-
SHA512
1ec72b96fca1fe35acdb90f874e52b0130c64a199010895bb6a571c5a94504b64f7f8daa0a4ab50ac88c6bdc896ff0788708844d521f17a8aa623fa742709bd3
-
SSDEEP
12288:h6vi1vjJGGna1FS3XXA9KgtIQoFUKiE+RWa9n/9HdavgF91NeyWDIrhz0EZGow11:Evi1LJ1na1isdfRKD+EaN/9HD1k9azzm
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.077017e5f92ab767447cc02a7017d126fc06e048811da11bb3956eac353e576aexe_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.077017e5f92ab767447cc02a7017d126fc06e048811da11bb3956eac353e576aexe_JC.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6379133890:AAGJOuhiVuDuvd6ZHHUAJ-h8KtZWJyxx3IY/
Targets
-
-
Target
NEAS.077017e5f92ab767447cc02a7017d126fc06e048811da11bb3956eac353e576aexe_JC.exe
-
Size
646KB
-
MD5
0bcd514d7e2d45de7bb8dea8d717617f
-
SHA1
9e058117755853bce0e80f0e44c91d00bb733e94
-
SHA256
077017e5f92ab767447cc02a7017d126fc06e048811da11bb3956eac353e576a
-
SHA512
1ec72b96fca1fe35acdb90f874e52b0130c64a199010895bb6a571c5a94504b64f7f8daa0a4ab50ac88c6bdc896ff0788708844d521f17a8aa623fa742709bd3
-
SSDEEP
12288:h6vi1vjJGGna1FS3XXA9KgtIQoFUKiE+RWa9n/9HdavgF91NeyWDIrhz0EZGow11:Evi1LJ1na1isdfRKD+EaN/9HD1k9azzm
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-