General
-
Target
e470ca1515de30d455b70bdeef3b2d1cc9a479f66e245843c0a235e6f0859943.exe
-
Size
626KB
-
Sample
240524-pw7j8scg4y
-
MD5
5f73c9853e26a72d00acb018db8a9175
-
SHA1
62b92ce12a85ef418deed00c907d32660162c9e1
-
SHA256
e470ca1515de30d455b70bdeef3b2d1cc9a479f66e245843c0a235e6f0859943
-
SHA512
28f71e2b9f42c2db1a3615ad31837bf2c23529bbefe0b171102be58669a2eb0809cc256cdc4200ca157f79ef554a1069d11c4c0c6d7b16ac9b5bb46557e5c61a
-
SSDEEP
12288:6FaXafmDSosLsjGLjvo3fNnRTLr16Mtol0fLtnccS5k7TSjBS47r0BS:6FaX3zLGLroPNnRTLkMtRfLScS5ESV0M
Static task
static1
Behavioral task
behavioral1
Sample
e470ca1515de30d455b70bdeef3b2d1cc9a479f66e245843c0a235e6f0859943.exe
Resource
win7-20240215-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6814314158:AAEkRl6H9QdGzzoVC6YfWI-wFLiqXO8LEls/
Targets
-
-
Target
e470ca1515de30d455b70bdeef3b2d1cc9a479f66e245843c0a235e6f0859943.exe
-
Size
626KB
-
MD5
5f73c9853e26a72d00acb018db8a9175
-
SHA1
62b92ce12a85ef418deed00c907d32660162c9e1
-
SHA256
e470ca1515de30d455b70bdeef3b2d1cc9a479f66e245843c0a235e6f0859943
-
SHA512
28f71e2b9f42c2db1a3615ad31837bf2c23529bbefe0b171102be58669a2eb0809cc256cdc4200ca157f79ef554a1069d11c4c0c6d7b16ac9b5bb46557e5c61a
-
SSDEEP
12288:6FaXafmDSosLsjGLjvo3fNnRTLr16Mtol0fLtnccS5k7TSjBS47r0BS:6FaX3zLGLroPNnRTLkMtRfLScS5ESV0M
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-