General
-
Target
0a1bb6980b88452e1353436fa29a5ad1fbfe51d1ea14d1e98f45af38d27f59a4
-
Size
166KB
-
Sample
240423-tsxm3shg95
-
MD5
31bb40e9ad8dd4797b71b4ece1891b82
-
SHA1
feb097b406032ac60fd90ece24f0147ffbf0f088
-
SHA256
0a1bb6980b88452e1353436fa29a5ad1fbfe51d1ea14d1e98f45af38d27f59a4
-
SHA512
16dec38ae3505e8183e5f3e51245b79c269e7f8fb769108f4ac21543d08df7036ebd3345af4712a06453f9b72595744b51a71f3132b9849b83f5bbb8f71113a4
-
SSDEEP
3072:tD/TzjlPUxRJgjHvW032MD944l1KxhGBdeieE1+kZ7DQMy2GgK0OgMaSyu6BkQ:tD/TzjlqgjHvW032MD9481QhGq1i02G1
Behavioral task
behavioral1
Sample
0a1bb6980b88452e1353436fa29a5ad1fbfe51d1ea14d1e98f45af38d27f59a4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0a1bb6980b88452e1353436fa29a5ad1fbfe51d1ea14d1e98f45af38d27f59a4.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5676971476:AAFdGsXW8kwzXNIluAGV-a4sJ2XBy68O9WI/
Targets
-
-
Target
0a1bb6980b88452e1353436fa29a5ad1fbfe51d1ea14d1e98f45af38d27f59a4
-
Size
166KB
-
MD5
31bb40e9ad8dd4797b71b4ece1891b82
-
SHA1
feb097b406032ac60fd90ece24f0147ffbf0f088
-
SHA256
0a1bb6980b88452e1353436fa29a5ad1fbfe51d1ea14d1e98f45af38d27f59a4
-
SHA512
16dec38ae3505e8183e5f3e51245b79c269e7f8fb769108f4ac21543d08df7036ebd3345af4712a06453f9b72595744b51a71f3132b9849b83f5bbb8f71113a4
-
SSDEEP
3072:tD/TzjlPUxRJgjHvW032MD944l1KxhGBdeieE1+kZ7DQMy2GgK0OgMaSyu6BkQ:tD/TzjlqgjHvW032MD9481QhGq1i02G1
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-