General
-
Target
b249fea44d101b432a7f0d610a98ba988c679ea04dfab7e359d721c5768679fc
-
Size
244KB
-
Sample
240526-crj7xsbc8y
-
MD5
ca8a5cdf0d5d0c9ebfdec524db0c4984
-
SHA1
19b06bba70fe970b7ca38b62906fd76da2a09a97
-
SHA256
b249fea44d101b432a7f0d610a98ba988c679ea04dfab7e359d721c5768679fc
-
SHA512
f8b9cce655f44a186483f73abc48a83d421347c6fcd5dfbb98e7b110b799847fac7da537da52abfa202876101c9c7ffa066909885de02d77a5c17499745e672c
-
SSDEEP
6144:ECteODDJzKcdOtPAfY8uXCYohiCkXJgjnG6Gfdi:Ee3BvAXJlFi
Behavioral task
behavioral1
Sample
b249fea44d101b432a7f0d610a98ba988c679ea04dfab7e359d721c5768679fc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b249fea44d101b432a7f0d610a98ba988c679ea04dfab7e359d721c5768679fc.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
https://discordapp.com/api/webhooks/1066985564278112277/oJEckb7xFKv0BG0FKt3E17kO22JxA9MO_wlyHpptkN3oVroODKUfIe2deqgQzS3t3nQI
Targets
-
-
Target
b249fea44d101b432a7f0d610a98ba988c679ea04dfab7e359d721c5768679fc
-
Size
244KB
-
MD5
ca8a5cdf0d5d0c9ebfdec524db0c4984
-
SHA1
19b06bba70fe970b7ca38b62906fd76da2a09a97
-
SHA256
b249fea44d101b432a7f0d610a98ba988c679ea04dfab7e359d721c5768679fc
-
SHA512
f8b9cce655f44a186483f73abc48a83d421347c6fcd5dfbb98e7b110b799847fac7da537da52abfa202876101c9c7ffa066909885de02d77a5c17499745e672c
-
SSDEEP
6144:ECteODDJzKcdOtPAfY8uXCYohiCkXJgjnG6Gfdi:Ee3BvAXJlFi
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-