General
-
Target
0f9d3f2e7e70b89cb6ff99273f5eebd0ad41298830b56f89a4c8a8cb96ddba2c
-
Size
617KB
-
Sample
240417-rv9pbadf2x
-
MD5
6fc0f4c89170ec596e7f7fcc2c83464e
-
SHA1
9c0e13125459351a3dfd736d127721f93cc9d46e
-
SHA256
0f9d3f2e7e70b89cb6ff99273f5eebd0ad41298830b56f89a4c8a8cb96ddba2c
-
SHA512
425e2a67738dfc8cb1b837b25d534888a6b409dec7bce4670e3ac148e70959f7935cb79720e317f2ec2fb2adff30e7ed7e5d5b8b3423cd438fd8187156f1de0b
-
SSDEEP
12288:wvAca64MSSDREulHUimwZPcdKheHrz3bELgyeJSuI+Oa:Ka2SS9EulHUihcdKIrfEPuJ
Static task
static1
Behavioral task
behavioral1
Sample
ba6ca59893666207fcc985056f408e08b82a09e6938a746edb2e769dc47d6ba7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ba6ca59893666207fcc985056f408e08b82a09e6938a746edb2e769dc47d6ba7.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6449842746:AAH1JUQ2Q5gmTWbMu0YfLR-2V7Z16tz7TzY/
Targets
-
-
Target
ba6ca59893666207fcc985056f408e08b82a09e6938a746edb2e769dc47d6ba7.exe
-
Size
633KB
-
MD5
ab4a7095947ee160de78ccd158baafc9
-
SHA1
76e1dccb90382e5772b5651efbf725fd7f3bb317
-
SHA256
ba6ca59893666207fcc985056f408e08b82a09e6938a746edb2e769dc47d6ba7
-
SHA512
0769cc39df610c17da050540a713e3d97b6f75b9baddddc84641f89d71ff8ebefaf640256b0af17f5255e256634c06ece6eb3ac76617ff030db1667ebc29f411
-
SSDEEP
12288:PGxLvnA7dLUvSLR3swp5Ii+gCfDbiT4u1XrR88pHe8tgmROOBaDW:PGx7nA7evCJzoi8MrOiJgr+ay
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-