General
-
Target
b05f89b3e8bb716f0f7e7ebb6c39b25526716ac0090ea34d64f7cfbfc38e0eed
-
Size
649KB
-
Sample
231207-dc7v4saed9
-
MD5
f5303dab6ec3bf092658b6fafb18b0e7
-
SHA1
b89dea5041fbd77da8d86130c09b1c43f6ec0e51
-
SHA256
b05f89b3e8bb716f0f7e7ebb6c39b25526716ac0090ea34d64f7cfbfc38e0eed
-
SHA512
66002c0c093ab04dda3d079d36e8069368ae86e3b72191619c392b14fed16decfda84b669294a1a8877c4801853a10c1f8b4304bf2e28eb992ac9ac1d44f856a
-
SSDEEP
12288:SMHQaueH5qvFTeIudT3uvPI45SpQX5X8BRsb6NhVm6GD7sWkBC6AKKquY:SMFqvFT03uIRY5XWR86Nnm6GDiBCb
Static task
static1
Behavioral task
behavioral1
Sample
b05f89b3e8bb716f0f7e7ebb6c39b25526716ac0090ea34d64f7cfbfc38e0eed.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
b05f89b3e8bb716f0f7e7ebb6c39b25526716ac0090ea34d64f7cfbfc38e0eed.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6661130786:AAFwhtBhx1DlGS6oC-wv7vgC1FzfwYR-xb8/
Targets
-
-
Target
b05f89b3e8bb716f0f7e7ebb6c39b25526716ac0090ea34d64f7cfbfc38e0eed
-
Size
649KB
-
MD5
f5303dab6ec3bf092658b6fafb18b0e7
-
SHA1
b89dea5041fbd77da8d86130c09b1c43f6ec0e51
-
SHA256
b05f89b3e8bb716f0f7e7ebb6c39b25526716ac0090ea34d64f7cfbfc38e0eed
-
SHA512
66002c0c093ab04dda3d079d36e8069368ae86e3b72191619c392b14fed16decfda84b669294a1a8877c4801853a10c1f8b4304bf2e28eb992ac9ac1d44f856a
-
SSDEEP
12288:SMHQaueH5qvFTeIudT3uvPI45SpQX5X8BRsb6NhVm6GD7sWkBC6AKKquY:SMFqvFT03uIRY5XWR86Nnm6GDiBCb
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-