General
-
Target
c47e77c8463ffdefebfad56288ac82f186379e235fff458ebb5b042e918dfb53
-
Size
659KB
-
Sample
231207-dcvksaaed8
-
MD5
48b1cab6b9e2536ae61c91d4531c371e
-
SHA1
8c609b60e4fd130c60fdf16f1db13a6633c7811d
-
SHA256
c47e77c8463ffdefebfad56288ac82f186379e235fff458ebb5b042e918dfb53
-
SHA512
f5a5bf5fa4fa2f74106edbb8d921f748955a911f4134f8546209cd548d066a49c7e7995e4c1268248a1cef6cf5e136bb53578c593e1f9b24dbb2fef733bf6d53
-
SSDEEP
12288:YFDQaueH5qoRYpNrOUlSmp7B798zCg1YBZyGSLNxeINZE6Lz:YFhqoipEwDgCgoZ0xeIVLz
Static task
static1
Behavioral task
behavioral1
Sample
c47e77c8463ffdefebfad56288ac82f186379e235fff458ebb5b042e918dfb53.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
c47e77c8463ffdefebfad56288ac82f186379e235fff458ebb5b042e918dfb53.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6488735902:AAFjq98r8SzTcc0BHWZQiLUk749fQ78ULos/
Targets
-
-
Target
c47e77c8463ffdefebfad56288ac82f186379e235fff458ebb5b042e918dfb53
-
Size
659KB
-
MD5
48b1cab6b9e2536ae61c91d4531c371e
-
SHA1
8c609b60e4fd130c60fdf16f1db13a6633c7811d
-
SHA256
c47e77c8463ffdefebfad56288ac82f186379e235fff458ebb5b042e918dfb53
-
SHA512
f5a5bf5fa4fa2f74106edbb8d921f748955a911f4134f8546209cd548d066a49c7e7995e4c1268248a1cef6cf5e136bb53578c593e1f9b24dbb2fef733bf6d53
-
SSDEEP
12288:YFDQaueH5qoRYpNrOUlSmp7B798zCg1YBZyGSLNxeINZE6Lz:YFhqoipEwDgCgoZ0xeIVLz
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-