General
-
Target
a0a48111d3e46bcee758b5c247fa0d3444ff79db4681e8ec78319a70eb8cf54f
-
Size
844KB
-
Sample
231208-b9e59agf32
-
MD5
869b99c46c9bc8c7a6586ed3090c9fce
-
SHA1
c2568abbf4a8ba33349be44cbb0244b5b7962f93
-
SHA256
a0a48111d3e46bcee758b5c247fa0d3444ff79db4681e8ec78319a70eb8cf54f
-
SHA512
dc664e156f6fc1fa1a4e6a088f7123fb870b6f1b4f0bc0d9362605ba45aa30521ca57b45db77990c8a917f151b60bdfd1b7a09975ae2af90af7d490cbeaf045d
-
SSDEEP
12288:B13V27YuPOq0BtHx6BSCw4A1IOZaEA4g4PTdK3lPY1MsOeBlkciDWB:33YjUHKVwp1bZaegidK1g1MsOeBlS
Static task
static1
Behavioral task
behavioral1
Sample
a0a48111d3e46bcee758b5c247fa0d3444ff79db4681e8ec78319a70eb8cf54f.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
a0a48111d3e46bcee758b5c247fa0d3444ff79db4681e8ec78319a70eb8cf54f.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5807029869:AAGsxVSshZSRiafw59B7rpMV8iPr8cSTNyg/
Targets
-
-
Target
a0a48111d3e46bcee758b5c247fa0d3444ff79db4681e8ec78319a70eb8cf54f
-
Size
844KB
-
MD5
869b99c46c9bc8c7a6586ed3090c9fce
-
SHA1
c2568abbf4a8ba33349be44cbb0244b5b7962f93
-
SHA256
a0a48111d3e46bcee758b5c247fa0d3444ff79db4681e8ec78319a70eb8cf54f
-
SHA512
dc664e156f6fc1fa1a4e6a088f7123fb870b6f1b4f0bc0d9362605ba45aa30521ca57b45db77990c8a917f151b60bdfd1b7a09975ae2af90af7d490cbeaf045d
-
SSDEEP
12288:B13V27YuPOq0BtHx6BSCw4A1IOZaEA4g4PTdK3lPY1MsOeBlkciDWB:33YjUHKVwp1bZaegidK1g1MsOeBlS
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-