General
-
Target
8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5
-
Size
705KB
-
Sample
231207-cwr4bsade8
-
MD5
fe4748a98f462363b1edecea652667e5
-
SHA1
0d000f7ef9776870dab6e114736ca35ce411de94
-
SHA256
8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5
-
SHA512
b00097454e26faec77cfb0398332637a557c273ebb3ce18a5f7f0d74350a4b77079a1011563254dbf80904758d2f3e1d04727d7196901f1072968ef1ad6d438f
-
SSDEEP
12288:IueH5qY2/Cn1N/o8l4f/VM9TmzDkRqTvE4Iakqe7D/aoQJzpmFA9L:cqNC3ovf/VqkkRqTE4Iape6oQ5gFA9
Static task
static1
Behavioral task
behavioral1
Sample
8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
agenttesla
https://discordapp.com/api/webhooks/1181498491458035742/1cF67FyYbH5hKZiQFxnepGP9ouAxF_JrbATJrR-c9cynhriJsqMv6wgLBGq6n67jkbl-
Targets
-
-
Target
8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5
-
Size
705KB
-
MD5
fe4748a98f462363b1edecea652667e5
-
SHA1
0d000f7ef9776870dab6e114736ca35ce411de94
-
SHA256
8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5
-
SHA512
b00097454e26faec77cfb0398332637a557c273ebb3ce18a5f7f0d74350a4b77079a1011563254dbf80904758d2f3e1d04727d7196901f1072968ef1ad6d438f
-
SSDEEP
12288:IueH5qY2/Cn1N/o8l4f/VM9TmzDkRqTvE4Iakqe7D/aoQJzpmFA9L:cqNC3ovf/VqkkRqTE4Iape6oQ5gFA9
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-