General
-
Target
f7c0471a702e24c7de7f214a24905704c6783043eab48c4b5a1eb347d846e952
-
Size
664KB
-
Sample
240514-b8a5xaec8v
-
MD5
ab7958eb77b1cb9aadfe366da2092027
-
SHA1
0399ef1e6468abea364ba97fc2ce58a20617b764
-
SHA256
f7c0471a702e24c7de7f214a24905704c6783043eab48c4b5a1eb347d846e952
-
SHA512
aae1bffd4c3652d4800e5939c8a19c02e89335353a6ff891a88e3cbaad7db36a99c5e8d64df0f44857ff464cddda05afe971630ab0c92522d9656f8763b77901
-
SSDEEP
12288:/Xe9PPlowWX0t6mOQwg1Qd15CcYk0We1FTjp7rBHguWJq/GuY4C0qZivK539a5ZP:GhloDX0XOf4X5BxWJq8Cxu9a5Z9WFm
Behavioral task
behavioral1
Sample
f7c0471a702e24c7de7f214a24905704c6783043eab48c4b5a1eb347d846e952.exe
Resource
win7-20240508-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6706700909:AAF84XSqJERRA6jKqejEqGMhCkiDguB_-5E/
Targets
-
-
Target
f7c0471a702e24c7de7f214a24905704c6783043eab48c4b5a1eb347d846e952
-
Size
664KB
-
MD5
ab7958eb77b1cb9aadfe366da2092027
-
SHA1
0399ef1e6468abea364ba97fc2ce58a20617b764
-
SHA256
f7c0471a702e24c7de7f214a24905704c6783043eab48c4b5a1eb347d846e952
-
SHA512
aae1bffd4c3652d4800e5939c8a19c02e89335353a6ff891a88e3cbaad7db36a99c5e8d64df0f44857ff464cddda05afe971630ab0c92522d9656f8763b77901
-
SSDEEP
12288:/Xe9PPlowWX0t6mOQwg1Qd15CcYk0We1FTjp7rBHguWJq/GuY4C0qZivK539a5ZP:GhloDX0XOf4X5BxWJq8Cxu9a5Z9WFm
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-