General
-
Target
c7bd5888b0018e6f2e66e66b48f459e4574d31b6801214511725be9e6253046b
-
Size
842KB
-
Sample
240523-cak3wshd5x
-
MD5
a958359d5a72ca2932a618d0726a813a
-
SHA1
a0c880b59ce3c64d867bec264bdb770aba3c6813
-
SHA256
c7bd5888b0018e6f2e66e66b48f459e4574d31b6801214511725be9e6253046b
-
SHA512
60fef0b2306001d4b42a0a3b5f350c0dc6711d1b4e19c9b96d122b30259493f17ee1bd891e984d6d89d22878e41e27040fe169547d787ac16a116390aeb0f785
-
SSDEEP
24576:jGI2UpCl4fad3nX6rtmcnwauA/h5trhptCvy9Y:jGMpg9X6Rm65rXmSY
Static task
static1
Behavioral task
behavioral1
Sample
c7bd5888b0018e6f2e66e66b48f459e4574d31b6801214511725be9e6253046b.exe
Resource
win7-20240215-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7003073627:AAGR-aHCbQE_Xm_F2ssZpgrlzdtURak1neo/
Targets
-
-
Target
c7bd5888b0018e6f2e66e66b48f459e4574d31b6801214511725be9e6253046b
-
Size
842KB
-
MD5
a958359d5a72ca2932a618d0726a813a
-
SHA1
a0c880b59ce3c64d867bec264bdb770aba3c6813
-
SHA256
c7bd5888b0018e6f2e66e66b48f459e4574d31b6801214511725be9e6253046b
-
SHA512
60fef0b2306001d4b42a0a3b5f350c0dc6711d1b4e19c9b96d122b30259493f17ee1bd891e984d6d89d22878e41e27040fe169547d787ac16a116390aeb0f785
-
SSDEEP
24576:jGI2UpCl4fad3nX6rtmcnwauA/h5trhptCvy9Y:jGMpg9X6Rm65rXmSY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-