General
-
Target
3947be8ac05c349d48d12ed94b71afb95fccf43cab810889159b9b0484a441f8
-
Size
1.1MB
-
Sample
231201-bd6y4adc36
-
MD5
d74e5c2edfe1a18ce82b14967ea4c5ee
-
SHA1
a46bf8e1a64294c40a6462f968cc571b664ba95a
-
SHA256
3947be8ac05c349d48d12ed94b71afb95fccf43cab810889159b9b0484a441f8
-
SHA512
f21ab4f538d87d419a84dd56806b190a02c6bcc67bdb96acedb1e845135cfd9178b32be8aaa8fa9d457dd7119f07bea5f0a4f2d36a3d38502998c685d4cb9e33
-
SSDEEP
12288:njYmca+sMEi6S4n09Y+N4OAZqZ3zLM6R+mnvMy8c9jFLKo9vJhee/3BqHOMbuZTo:UwjUL++9j/e7L8CifrXnHIs
Behavioral task
behavioral1
Sample
3947be8ac05c349d48d12ed94b71afb95fccf43cab810889159b9b0484a441f8.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
3947be8ac05c349d48d12ed94b71afb95fccf43cab810889159b9b0484a441f8.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6760916656:AAFTROumNysgqsjoqAvyBqjbR9y3VV4we2Y/
Targets
-
-
Target
3947be8ac05c349d48d12ed94b71afb95fccf43cab810889159b9b0484a441f8
-
Size
1.1MB
-
MD5
d74e5c2edfe1a18ce82b14967ea4c5ee
-
SHA1
a46bf8e1a64294c40a6462f968cc571b664ba95a
-
SHA256
3947be8ac05c349d48d12ed94b71afb95fccf43cab810889159b9b0484a441f8
-
SHA512
f21ab4f538d87d419a84dd56806b190a02c6bcc67bdb96acedb1e845135cfd9178b32be8aaa8fa9d457dd7119f07bea5f0a4f2d36a3d38502998c685d4cb9e33
-
SSDEEP
12288:njYmca+sMEi6S4n09Y+N4OAZqZ3zLM6R+mnvMy8c9jFLKo9vJhee/3BqHOMbuZTo:UwjUL++9j/e7L8CifrXnHIs
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect PureLogs payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-