General
-
Target
8fc72d1b6bc15fbb7bcae8822b98c280b19359f20ed59dcec111ce4d70efbaa7.exe
-
Size
875KB
-
Sample
231206-vr78vsah73
-
MD5
10a12d74b0af33d14a4923d86fe73c11
-
SHA1
9fbdb5bc06316b92ecaea2cec3354654a9dff3bc
-
SHA256
8fc72d1b6bc15fbb7bcae8822b98c280b19359f20ed59dcec111ce4d70efbaa7
-
SHA512
0755f1b30ee83f550686b46c2f77a69c9fde72b8a1c2870aed94405dd6fa7327ce4f6ab50f567fb354b577dc95f6b3f61d1dd74b8db0bd8f8db7919a42082842
-
SSDEEP
24576:cmzfJNIl+jJLp4wFRo3yc03LWhZDW5sIO1A:cUzh7o3R03LWr2O
Static task
static1
Behavioral task
behavioral1
Sample
8fc72d1b6bc15fbb7bcae8822b98c280b19359f20ed59dcec111ce4d70efbaa7.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
8fc72d1b6bc15fbb7bcae8822b98c280b19359f20ed59dcec111ce4d70efbaa7.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
https://discordapp.com/api/webhooks/1181498491458035742/1cF67FyYbH5hKZiQFxnepGP9ouAxF_JrbATJrR-c9cynhriJsqMv6wgLBGq6n67jkbl-
Targets
-
-
Target
8fc72d1b6bc15fbb7bcae8822b98c280b19359f20ed59dcec111ce4d70efbaa7.exe
-
Size
875KB
-
MD5
10a12d74b0af33d14a4923d86fe73c11
-
SHA1
9fbdb5bc06316b92ecaea2cec3354654a9dff3bc
-
SHA256
8fc72d1b6bc15fbb7bcae8822b98c280b19359f20ed59dcec111ce4d70efbaa7
-
SHA512
0755f1b30ee83f550686b46c2f77a69c9fde72b8a1c2870aed94405dd6fa7327ce4f6ab50f567fb354b577dc95f6b3f61d1dd74b8db0bd8f8db7919a42082842
-
SSDEEP
24576:cmzfJNIl+jJLp4wFRo3yc03LWhZDW5sIO1A:cUzh7o3R03LWr2O
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-