General
-
Target
KLM093778373.exe
-
Size
170KB
-
Sample
240125-jnn52acadk
-
MD5
794221c770d3a022d565153190b5fe8b
-
SHA1
1bb7a79856b614c6925e2e99a4005c55f471fc8f
-
SHA256
5ab03258f60ece5b9b7d1681d56de20af50eb9783a3f1b84a5f683f14c7a6471
-
SHA512
c41ca1008f39edd0b16e89cb1cbbcb985497c0d2753458be674840efb3b83aaf04f907d15ccbf1872238c1616ae8ff048bc0fc247f26370e978908550f78e9a9
-
SSDEEP
3072:i54NFWQvWOWyM07kkIIZB7Joi/y7oQPypIMT88DCjKeDwnehokG1Lq2Jkp4H2xVX:FNFWQMMtbZIicypIMT88DCjKeDwnehom
Static task
static1
Behavioral task
behavioral1
Sample
KLM093778373.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
KLM093778373.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6248079103:AAHguAsTEqW6RfyeC5Wjh_pmDy9cvQi28aU/
Targets
-
-
Target
KLM093778373.exe
-
Size
170KB
-
MD5
794221c770d3a022d565153190b5fe8b
-
SHA1
1bb7a79856b614c6925e2e99a4005c55f471fc8f
-
SHA256
5ab03258f60ece5b9b7d1681d56de20af50eb9783a3f1b84a5f683f14c7a6471
-
SHA512
c41ca1008f39edd0b16e89cb1cbbcb985497c0d2753458be674840efb3b83aaf04f907d15ccbf1872238c1616ae8ff048bc0fc247f26370e978908550f78e9a9
-
SSDEEP
3072:i54NFWQvWOWyM07kkIIZB7Joi/y7oQPypIMT88DCjKeDwnehokG1Lq2Jkp4H2xVX:FNFWQMMtbZIicypIMT88DCjKeDwnehom
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-