General
-
Target
1c8411d0dd544bd74eb6994ad731065f05d55e00e4046d29f9f9a9abde5db672
-
Size
790KB
-
Sample
231208-cet7csgf54
-
MD5
2215e1fdd4293fbc68592f04c85d55ef
-
SHA1
b4861fdb38c1fb3e55bc21cf97a885d174c02833
-
SHA256
1c8411d0dd544bd74eb6994ad731065f05d55e00e4046d29f9f9a9abde5db672
-
SHA512
79f63c59a3e0990c3601f99260120b70cea0a180807fb6a9cd3e454d086d13e14f9d7cc53b81f0642bb6c2d5e710f74eb44c584ff6945d87764e2902a5da1324
-
SSDEEP
12288:jG4hkZ5ppiBvrwQPumRo0+wVOhRKdGb6MDaNuC4nmewzgFND1AW6CIwpDp1rDsl:jpK/Yr3PumTBdBNmmWFNDzrpDp1
Static task
static1
Behavioral task
behavioral1
Sample
1c8411d0dd544bd74eb6994ad731065f05d55e00e4046d29f9f9a9abde5db672.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
1c8411d0dd544bd74eb6994ad731065f05d55e00e4046d29f9f9a9abde5db672.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1698102386:AAGwF1zMDcFKPxdmICBbFvdWXY6IHV5KR3E/
Targets
-
-
Target
1c8411d0dd544bd74eb6994ad731065f05d55e00e4046d29f9f9a9abde5db672
-
Size
790KB
-
MD5
2215e1fdd4293fbc68592f04c85d55ef
-
SHA1
b4861fdb38c1fb3e55bc21cf97a885d174c02833
-
SHA256
1c8411d0dd544bd74eb6994ad731065f05d55e00e4046d29f9f9a9abde5db672
-
SHA512
79f63c59a3e0990c3601f99260120b70cea0a180807fb6a9cd3e454d086d13e14f9d7cc53b81f0642bb6c2d5e710f74eb44c584ff6945d87764e2902a5da1324
-
SSDEEP
12288:jG4hkZ5ppiBvrwQPumRo0+wVOhRKdGb6MDaNuC4nmewzgFND1AW6CIwpDp1rDsl:jpK/Yr3PumTBdBNmmWFNDzrpDp1
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-