General
-
Target
ae7841e1d3ca24213e0678d7dd2db51579834a62fec83c315dd463da4f5a5c13
-
Size
3.9MB
-
Sample
231226-bpph7aaadr
-
MD5
3d018d14d07b7c9635c209eb0543cab8
-
SHA1
e5042c81a8582ba177895ba049a90b60800e2297
-
SHA256
ae7841e1d3ca24213e0678d7dd2db51579834a62fec83c315dd463da4f5a5c13
-
SHA512
6d6ea642206f2fafaabf3f8a7165aa5bd22e77722fe0730f28d61c0d13d44b03a02df12aa1fec4e2cb29a6fc3c36754e6c052aee502b197fb680329b891598a5
-
SSDEEP
49152:9eA3k5ul6MhfuPQoCGUiKxdszvdAQgFPhEyzYKsG6sVet39OO1:f6kAz9GMr
Static task
static1
Behavioral task
behavioral1
Sample
ae7841e1d3ca24213e0678d7dd2db51579834a62fec83c315dd463da4f5a5c13.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ae7841e1d3ca24213e0678d7dd2db51579834a62fec83c315dd463da4f5a5c13.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6603930847:AAFEPpt87jNrswsoxRziEquzc7QyaetKssE/
Targets
-
-
Target
ae7841e1d3ca24213e0678d7dd2db51579834a62fec83c315dd463da4f5a5c13
-
Size
3.9MB
-
MD5
3d018d14d07b7c9635c209eb0543cab8
-
SHA1
e5042c81a8582ba177895ba049a90b60800e2297
-
SHA256
ae7841e1d3ca24213e0678d7dd2db51579834a62fec83c315dd463da4f5a5c13
-
SHA512
6d6ea642206f2fafaabf3f8a7165aa5bd22e77722fe0730f28d61c0d13d44b03a02df12aa1fec4e2cb29a6fc3c36754e6c052aee502b197fb680329b891598a5
-
SSDEEP
49152:9eA3k5ul6MhfuPQoCGUiKxdszvdAQgFPhEyzYKsG6sVet39OO1:f6kAz9GMr
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-