General
-
Target
ef1fbaf09a00979fb3c25debeebe53c2ff844f11d817d5d925c634666c5657ac
-
Size
820KB
-
Sample
231206-dkxp4sae94
-
MD5
e1eb6a93f5b33ba65a052a6de047af05
-
SHA1
46b112ed5b75224f44707967ccebf15e99845be3
-
SHA256
ef1fbaf09a00979fb3c25debeebe53c2ff844f11d817d5d925c634666c5657ac
-
SHA512
abdce0bb8ddf97e68e5d93d6e6cd5feb98658f9c2020a2677c83dd6777ba6d49d81b30f243348bdaa2f84da21636cfbfe8c54a069829b67ecfe3fea787a191bd
-
SSDEEP
12288:OLKE6jD/62iNG5nF8TUEo0g+OVY38KclmzNsvsuG6rxN71wQw4VvFXHUQ853:OLKtD/61I6vSGsp8Nqs81NhE45NS5
Static task
static1
Behavioral task
behavioral1
Sample
ef1fbaf09a00979fb3c25debeebe53c2ff844f11d817d5d925c634666c5657ac.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ef1fbaf09a00979fb3c25debeebe53c2ff844f11d817d5d925c634666c5657ac.exe
Resource
win10v2004-20231201-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6774056184:AAGNRsfh8TKtp3v_QDZCQW1e8ODSvVaHvMo/
Targets
-
-
Target
ef1fbaf09a00979fb3c25debeebe53c2ff844f11d817d5d925c634666c5657ac
-
Size
820KB
-
MD5
e1eb6a93f5b33ba65a052a6de047af05
-
SHA1
46b112ed5b75224f44707967ccebf15e99845be3
-
SHA256
ef1fbaf09a00979fb3c25debeebe53c2ff844f11d817d5d925c634666c5657ac
-
SHA512
abdce0bb8ddf97e68e5d93d6e6cd5feb98658f9c2020a2677c83dd6777ba6d49d81b30f243348bdaa2f84da21636cfbfe8c54a069829b67ecfe3fea787a191bd
-
SSDEEP
12288:OLKE6jD/62iNG5nF8TUEo0g+OVY38KclmzNsvsuG6rxN71wQw4VvFXHUQ853:OLKtD/61I6vSGsp8Nqs81NhE45NS5
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-