General
-
Target
5147ab52ccd30899d18c5d3fe05ed49932647a406c8720737bd86032aa27438f
-
Size
665KB
-
Sample
240525-blff4she98
-
MD5
af1dd89780930e377798fc606fd7df41
-
SHA1
dd5154d050ccbf24656af2bf231b48888fd22028
-
SHA256
5147ab52ccd30899d18c5d3fe05ed49932647a406c8720737bd86032aa27438f
-
SHA512
5dd951e220b9b743a49a66bdfd2559cab3082013d8eb0479f26e37a14103cc71f5f646bdfff23d501552cf63c0172da8bbac7704112c0d7580b63f62979aea6c
-
SSDEEP
12288:YlYifT0paM3B0I+Cvqvfbrfhnfk6FX9gHDXxr67enaXlYt29bAUDqX4R3x7:3iggaBGfHhnLWBr67enwbDQY7
Static task
static1
Behavioral task
behavioral1
Sample
5147ab52ccd30899d18c5d3fe05ed49932647a406c8720737bd86032aa27438f.exe
Resource
win7-20240508-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6791276906:AAFua0cb90JLBIItAyl375Z0CKgcri0i9_k/
Targets
-
-
Target
5147ab52ccd30899d18c5d3fe05ed49932647a406c8720737bd86032aa27438f
-
Size
665KB
-
MD5
af1dd89780930e377798fc606fd7df41
-
SHA1
dd5154d050ccbf24656af2bf231b48888fd22028
-
SHA256
5147ab52ccd30899d18c5d3fe05ed49932647a406c8720737bd86032aa27438f
-
SHA512
5dd951e220b9b743a49a66bdfd2559cab3082013d8eb0479f26e37a14103cc71f5f646bdfff23d501552cf63c0172da8bbac7704112c0d7580b63f62979aea6c
-
SSDEEP
12288:YlYifT0paM3B0I+Cvqvfbrfhnfk6FX9gHDXxr67enaXlYt29bAUDqX4R3x7:3iggaBGfHhnLWBr67enwbDQY7
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-