General
-
Target
ca2e7abccc5cb10dce5c6e7374fe5a35.bin
-
Size
625KB
-
Sample
240327-evkc7sfe7z
-
MD5
792922fccd5d5dd5111e311c6dfaa329
-
SHA1
a0f5b30d53f118732676fa239fc45a7ca336bb8c
-
SHA256
c97a9008aad295bd5fb4e207d392b401c2d074b51aedafc7b6211ffa517654e8
-
SHA512
e469518a3d0a9b2cbe5e08c74b599a574b6fdcf080621f4f47525ab9c8644fb2a7030e714147b3b0c04f3a3ca5ebd1b0c0be022a6623453b9172e487fb8c447f
-
SSDEEP
12288:Zgo5YP2+swpqTvhVZP4lLrN4jVH7VNakTvi73m4YX7O4DEeq52vTvR5QFo:NYP2woTJVZCLB4jVbTakKqX7tEeRvTcC
Static task
static1
Behavioral task
behavioral1
Sample
ee1f5806bdc523e06b98c513142a735ac3c16da9948c645a9916bd68cf24673b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ee1f5806bdc523e06b98c513142a735ac3c16da9948c645a9916bd68cf24673b.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6240128422:AAGfewUxVcQqKio_MV181yAuk31JpsBcgy8/
Targets
-
-
Target
ee1f5806bdc523e06b98c513142a735ac3c16da9948c645a9916bd68cf24673b.exe
-
Size
681KB
-
MD5
ca2e7abccc5cb10dce5c6e7374fe5a35
-
SHA1
4c4ff642534ebb32d4edd6c752f6309ee9fbcf02
-
SHA256
ee1f5806bdc523e06b98c513142a735ac3c16da9948c645a9916bd68cf24673b
-
SHA512
badc6a66922e810322e6e7f4876de5bf2d7e67322c7ecc03847aca201f4c79b4017abbfaf30145adaa201c348579c36880de6c21a30d6911257799dff2c89526
-
SSDEEP
12288:BJggC74CMw3iOdiDSZnRtnt9iXSSfI5qIFngvpZsG9WxzQaU3y:BJgFoOdjtnOSKPhh6GEQn3
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-