General
-
Target
100db370d21c6125afd6d3358d100860.bin
-
Size
312KB
-
Sample
240502-bdb4qacc7w
-
MD5
992c2839fd14e0648317aab613b52983
-
SHA1
9bb8497bf6731c4762584e708bd7d12a089d28a5
-
SHA256
f2e86040af8be9ce037f5692c994f54dd9b773c55b44477c2face02d095add3a
-
SHA512
338d57d1c4579b808e9b2f502c1e41d83620046e8b6ddf9d57262b8bb5cb5793f594f3e5a9848c4a4bd600e31b4c1d318e4d92e4d13f367516a6c8ea9d6eb841
-
SSDEEP
6144:qUk1wTXLCqVM6HmA0YRkU0xqjkh4Jz7OfeiNd7kIHR+ovWftwmt:5dXuqFfkzx1Kl7Ofxj7clvt
Static task
static1
Behavioral task
behavioral1
Sample
60cec2b7e0df1c0b13e6b636ae979b2e6abb5e567a62326bf36c73c84a348636.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
60cec2b7e0df1c0b13e6b636ae979b2e6abb5e567a62326bf36c73c84a348636.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7185592808:AAH40VecOIxIokAMjd2dL-3MoQxpbXJyxfE/
Targets
-
-
Target
60cec2b7e0df1c0b13e6b636ae979b2e6abb5e567a62326bf36c73c84a348636.exe
-
Size
573KB
-
MD5
100db370d21c6125afd6d3358d100860
-
SHA1
cb7a55063bcad757c98db289720b79cc127e8c55
-
SHA256
60cec2b7e0df1c0b13e6b636ae979b2e6abb5e567a62326bf36c73c84a348636
-
SHA512
a9ea18c130358aae6d5516f765a09c1325a25237ab27aff1656b2e774aa81506e0d397190b3a9456c77e638da630ddd0618e6f56c68531ccbe9b3b3dd1213669
-
SSDEEP
12288:lfKDRvpATCjwb5PpJYuFAVM8YyoCP7r9r/+ppppppppppppppppppppppppppppd:EbATvRpJT8YZC1q
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-