General
-
Target
b18f3f7bfbef4fe4dcc05ce549cca1a17832573bee4ac7ee03ab5eb66312642d.exe
-
Size
1000KB
-
Sample
240514-szg1jacf8y
-
MD5
47b16e69d5de9f504b97c51fbe86058a
-
SHA1
6d316883d0db78d1b82ad2af26f19d87efec6cc1
-
SHA256
b18f3f7bfbef4fe4dcc05ce549cca1a17832573bee4ac7ee03ab5eb66312642d
-
SHA512
c119a1701ae148b0335c5c19ecc88f6bcfa88e089d85955955f8208dda26a486349248c4d71492849992bbebae73a374f979cb3168156d9d78e5a6861e1f306b
-
SSDEEP
12288:bwTeH81jJUetQaZMH1BdV+6zC/wSHUOxUGv+TO74XvMxX6q:f8MetQPXY6zC/wSXAO74UxX6q
Static task
static1
Behavioral task
behavioral1
Sample
b18f3f7bfbef4fe4dcc05ce549cca1a17832573bee4ac7ee03ab5eb66312642d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b18f3f7bfbef4fe4dcc05ce549cca1a17832573bee4ac7ee03ab5eb66312642d.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7060813422:AAFqFKdMJlLvutqPAnHO4f8vnk2X1rQvsl0/
Targets
-
-
Target
b18f3f7bfbef4fe4dcc05ce549cca1a17832573bee4ac7ee03ab5eb66312642d.exe
-
Size
1000KB
-
MD5
47b16e69d5de9f504b97c51fbe86058a
-
SHA1
6d316883d0db78d1b82ad2af26f19d87efec6cc1
-
SHA256
b18f3f7bfbef4fe4dcc05ce549cca1a17832573bee4ac7ee03ab5eb66312642d
-
SHA512
c119a1701ae148b0335c5c19ecc88f6bcfa88e089d85955955f8208dda26a486349248c4d71492849992bbebae73a374f979cb3168156d9d78e5a6861e1f306b
-
SSDEEP
12288:bwTeH81jJUetQaZMH1BdV+6zC/wSHUOxUGv+TO74XvMxX6q:f8MetQPXY6zC/wSXAO74UxX6q
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-