General
-
Target
485518fe4eb558d35ea8ea04af66331e87838e0cb0604df0ec54fab4305be4a7
-
Size
163KB
-
Sample
240521-b3f4zaed9w
-
MD5
e48c329a00310865d6337bc19f995b9a
-
SHA1
c2da3bc0632c6fa19e5658e9128a6731a1facef1
-
SHA256
485518fe4eb558d35ea8ea04af66331e87838e0cb0604df0ec54fab4305be4a7
-
SHA512
4d4b3a5447b77771334612afb9d3e5fc03d75c689b759bafa03160690cad3c128ce5a4e4f9f9e719d5e8f7022007e3fe18f79989ea39ffc425a60c39cba27a95
-
SSDEEP
3072:ZzFOw3GFvSmlpvSkNTfKr1foePOvFgUiDlQaZPsP:ivS2ZMpZ0P
Static task
static1
Behavioral task
behavioral1
Sample
485518fe4eb558d35ea8ea04af66331e87838e0cb0604df0ec54fab4305be4a7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
485518fe4eb558d35ea8ea04af66331e87838e0cb0604df0ec54fab4305be4a7.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6943264474:AAEBBaFIvEVQEKoHhCOHg0isUZ66U7hLvTk/
Targets
-
-
Target
485518fe4eb558d35ea8ea04af66331e87838e0cb0604df0ec54fab4305be4a7
-
Size
163KB
-
MD5
e48c329a00310865d6337bc19f995b9a
-
SHA1
c2da3bc0632c6fa19e5658e9128a6731a1facef1
-
SHA256
485518fe4eb558d35ea8ea04af66331e87838e0cb0604df0ec54fab4305be4a7
-
SHA512
4d4b3a5447b77771334612afb9d3e5fc03d75c689b759bafa03160690cad3c128ce5a4e4f9f9e719d5e8f7022007e3fe18f79989ea39ffc425a60c39cba27a95
-
SSDEEP
3072:ZzFOw3GFvSmlpvSkNTfKr1foePOvFgUiDlQaZPsP:ivS2ZMpZ0P
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-