General
-
Target
0661da0b2c0e78d7e26805d3eaeeb13831dafb2074deccf1dc364d98833813f7
-
Size
693KB
-
Sample
240417-cq22cacf2s
-
MD5
2ae797d398724f20fbbd1731a3665c05
-
SHA1
a0a86e94b0ed8536494390369dc6d6286be5fac8
-
SHA256
0661da0b2c0e78d7e26805d3eaeeb13831dafb2074deccf1dc364d98833813f7
-
SHA512
86a9cf2766b63e82aacd92e7d8b1e00253500cd3aaf30ff19876c832a0652f8a8357545b083e34a11d26102d3e9797926f8dce7e1bffa60478fa1f03e38f6256
-
SSDEEP
12288:v8ekWMKL4UXGVva0toF85XiqfbH77p1iyCwLxxcQ61v:v8ekWMKL72Vy0N1D77XiyCA4d
Static task
static1
Behavioral task
behavioral1
Sample
0661da0b2c0e78d7e26805d3eaeeb13831dafb2074deccf1dc364d98833813f7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0661da0b2c0e78d7e26805d3eaeeb13831dafb2074deccf1dc364d98833813f7.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6803239128:AAFJ0E9lvP6fcMXr8mRcOku0DvcHIMnaVVw/
Targets
-
-
Target
0661da0b2c0e78d7e26805d3eaeeb13831dafb2074deccf1dc364d98833813f7
-
Size
693KB
-
MD5
2ae797d398724f20fbbd1731a3665c05
-
SHA1
a0a86e94b0ed8536494390369dc6d6286be5fac8
-
SHA256
0661da0b2c0e78d7e26805d3eaeeb13831dafb2074deccf1dc364d98833813f7
-
SHA512
86a9cf2766b63e82aacd92e7d8b1e00253500cd3aaf30ff19876c832a0652f8a8357545b083e34a11d26102d3e9797926f8dce7e1bffa60478fa1f03e38f6256
-
SSDEEP
12288:v8ekWMKL4UXGVva0toF85XiqfbH77p1iyCwLxxcQ61v:v8ekWMKL72Vy0N1D77XiyCA4d
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-