General
-
Target
2b438a5f6c0d8a371a194fdb7c57511862fa8569b439a75c8028ef30bbac58d8
-
Size
936KB
-
Sample
240521-bxna4aec3x
-
MD5
12f0984001a496b1b0ffc2a194c941a3
-
SHA1
f5be29bdbae4decdb20a60f324fbb9dd3d0934ef
-
SHA256
2b438a5f6c0d8a371a194fdb7c57511862fa8569b439a75c8028ef30bbac58d8
-
SHA512
b6e83213b59c8e499b8cb97ed75de224b323bbebe8559eb6d6c0d22fc8deef57d76c4a84878e895859260cc605ace2f341faa0b82bc9f4e7ac42c7277b45ed27
-
SSDEEP
12288:WLwnvLhvEKk5t0QQMl/Dgoc0K3+XTsJ9AsPhS7xeQfpcv6606VbqmI:WLEv1EKk5t1g/DYEAsPs7xe40qm
Static task
static1
Behavioral task
behavioral1
Sample
2b438a5f6c0d8a371a194fdb7c57511862fa8569b439a75c8028ef30bbac58d8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2b438a5f6c0d8a371a194fdb7c57511862fa8569b439a75c8028ef30bbac58d8.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6602115092:AAE_EkIum3mOHF88T9ufYt_oJr5nE8bFoJA/
Targets
-
-
Target
2b438a5f6c0d8a371a194fdb7c57511862fa8569b439a75c8028ef30bbac58d8
-
Size
936KB
-
MD5
12f0984001a496b1b0ffc2a194c941a3
-
SHA1
f5be29bdbae4decdb20a60f324fbb9dd3d0934ef
-
SHA256
2b438a5f6c0d8a371a194fdb7c57511862fa8569b439a75c8028ef30bbac58d8
-
SHA512
b6e83213b59c8e499b8cb97ed75de224b323bbebe8559eb6d6c0d22fc8deef57d76c4a84878e895859260cc605ace2f341faa0b82bc9f4e7ac42c7277b45ed27
-
SSDEEP
12288:WLwnvLhvEKk5t0QQMl/Dgoc0K3+XTsJ9AsPhS7xeQfpcv6606VbqmI:WLEv1EKk5t1g/DYEAsPs7xe40qm
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-