General
-
Target
0f5732b1320632b53b8adc5cabf2eacac25363602b45711f2c07b5fed0c4b4e1
-
Size
165KB
-
Sample
240523-bsbfqsgf44
-
MD5
7f960a25874860e3cb2f6d1065380dbe
-
SHA1
88ba2696cea24a9181d603aa0fcdb624fc56500a
-
SHA256
0f5732b1320632b53b8adc5cabf2eacac25363602b45711f2c07b5fed0c4b4e1
-
SHA512
a9629b05f67c039f6037d5b2640be069c3c8d4265a8bf91105cbe853edcadb0e3883f89b02119ea4a905b0340e149a183aaac5b714a1b4243e7fa076b4d2f22f
-
SSDEEP
3072:d7vXpUuAA58+YO7FAJfSLuuvRExAY6gFSDuEFQHDlbVugXB:d7vXpUuAWYO7FWDTxA8FSxFQHxU
Behavioral task
behavioral1
Sample
0f5732b1320632b53b8adc5cabf2eacac25363602b45711f2c07b5fed0c4b4e1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0f5732b1320632b53b8adc5cabf2eacac25363602b45711f2c07b5fed0c4b4e1.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6048733251:AAHRY3bwFxY_dCpUKVaxkoIu25MIjLFtqRA/
Targets
-
-
Target
0f5732b1320632b53b8adc5cabf2eacac25363602b45711f2c07b5fed0c4b4e1
-
Size
165KB
-
MD5
7f960a25874860e3cb2f6d1065380dbe
-
SHA1
88ba2696cea24a9181d603aa0fcdb624fc56500a
-
SHA256
0f5732b1320632b53b8adc5cabf2eacac25363602b45711f2c07b5fed0c4b4e1
-
SHA512
a9629b05f67c039f6037d5b2640be069c3c8d4265a8bf91105cbe853edcadb0e3883f89b02119ea4a905b0340e149a183aaac5b714a1b4243e7fa076b4d2f22f
-
SSDEEP
3072:d7vXpUuAA58+YO7FAJfSLuuvRExAY6gFSDuEFQHDlbVugXB:d7vXpUuAWYO7FWDTxA8FSxFQHxU
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-