General
-
Target
55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623
-
Size
763KB
-
Sample
231208-b8py3ahh5v
-
MD5
f1bd9d7b95c0574bce081b4db67d9ac0
-
SHA1
d0d03d247ab719476973ac4baa4cb6f1f7bc2bec
-
SHA256
55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623
-
SHA512
dc4e02f93eb46183674aaed63b7a7705e6c5e758092ea582d7e0fb46ef5606b581eecbb3bebae648bfe5b0b3bab4a8e9bb3f5658a3afed1b53e860a88db244f8
-
SSDEEP
12288:4Nvq/IeD0XjZlSk0MCCbg/igCk/nUGaujjGGxXrTZYAO35XSnd2+k+koaNS:4lq/UFlEMCC8bva+/rrOJi
Static task
static1
Behavioral task
behavioral1
Sample
55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6336364775:AAEDkjlLajiBt-8GN_k5ZdqGEnltWbPdH20/
Targets
-
-
Target
55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623
-
Size
763KB
-
MD5
f1bd9d7b95c0574bce081b4db67d9ac0
-
SHA1
d0d03d247ab719476973ac4baa4cb6f1f7bc2bec
-
SHA256
55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623
-
SHA512
dc4e02f93eb46183674aaed63b7a7705e6c5e758092ea582d7e0fb46ef5606b581eecbb3bebae648bfe5b0b3bab4a8e9bb3f5658a3afed1b53e860a88db244f8
-
SSDEEP
12288:4Nvq/IeD0XjZlSk0MCCbg/igCk/nUGaujjGGxXrTZYAO35XSnd2+k+koaNS:4lq/UFlEMCC8bva+/rrOJi
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-