General
-
Target
c552b8ecaf95f50de9d1bd6e73bd241227d202b483cc6f9179d9a9b88ad796a1
-
Size
46KB
-
Sample
231208-cg91lahh8w
-
MD5
e6a54ac9fc726f9e97bf504300cce3b2
-
SHA1
735ef8962bd6a9e4f45d7b9e03d6b5066923bfd5
-
SHA256
c552b8ecaf95f50de9d1bd6e73bd241227d202b483cc6f9179d9a9b88ad796a1
-
SHA512
ca5ac209f710e7a7d9fbf2d32258548afe757b149869d68257bd4fda6499c78c9174e4763991f1b6c27846038a6c286b3f465643b57bf8e1bfb19a7f48a24f5a
-
SSDEEP
768:ebFP85m9v/hW+i20vMu/eDFxm5a2pc1SdwBLObtNGF58b60sADZEpYinAMxK6dQ:eRP8ka+BuCxiaY/SB4LGH06gi7HxLdQ
Static task
static1
Behavioral task
behavioral1
Sample
c552b8ecaf95f50de9d1bd6e73bd241227d202b483cc6f9179d9a9b88ad796a1.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
c552b8ecaf95f50de9d1bd6e73bd241227d202b483cc6f9179d9a9b88ad796a1.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6414995176:AAGuFTS3tKhdeIu6sCNhCNw8cv7vkPJh1TQ/
Targets
-
-
Target
c552b8ecaf95f50de9d1bd6e73bd241227d202b483cc6f9179d9a9b88ad796a1
-
Size
46KB
-
MD5
e6a54ac9fc726f9e97bf504300cce3b2
-
SHA1
735ef8962bd6a9e4f45d7b9e03d6b5066923bfd5
-
SHA256
c552b8ecaf95f50de9d1bd6e73bd241227d202b483cc6f9179d9a9b88ad796a1
-
SHA512
ca5ac209f710e7a7d9fbf2d32258548afe757b149869d68257bd4fda6499c78c9174e4763991f1b6c27846038a6c286b3f465643b57bf8e1bfb19a7f48a24f5a
-
SSDEEP
768:ebFP85m9v/hW+i20vMu/eDFxm5a2pc1SdwBLObtNGF58b60sADZEpYinAMxK6dQ:eRP8ka+BuCxiaY/SB4LGH06gi7HxLdQ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-