General
-
Target
c5746323feb5767de7ca29e232458386f5699e21c013d714e37acb6b77bd824a
-
Size
1.4MB
-
Sample
240606-bg1w9adc7y
-
MD5
c730cd2d84cfadc530360d91b2bc2791
-
SHA1
e7f5258dbaf4e43e154068859042028545b1e873
-
SHA256
c5746323feb5767de7ca29e232458386f5699e21c013d714e37acb6b77bd824a
-
SHA512
a9f10cc7946bdb1901b2e0dfb8eced2e5c1947d1c24525036f6120de479c4ff13cfd917bcda3f3b148f931056ad021204e63bfa59194981695f16f22fb4928ef
-
SSDEEP
24576:rNnYahM9SH+ZeqWiIXaowZimVhChgKvaUIdY:rNYahM9SH+ZeqzIXyJChAjm
Static task
static1
Behavioral task
behavioral1
Sample
c5746323feb5767de7ca29e232458386f5699e21c013d714e37acb6b77bd824a.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
c5746323feb5767de7ca29e232458386f5699e21c013d714e37acb6b77bd824a.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5711013641:AAFQCl-5Y4KSCKb1njte7I7JzABT0FmJ3OU/
Targets
-
-
Target
c5746323feb5767de7ca29e232458386f5699e21c013d714e37acb6b77bd824a
-
Size
1.4MB
-
MD5
c730cd2d84cfadc530360d91b2bc2791
-
SHA1
e7f5258dbaf4e43e154068859042028545b1e873
-
SHA256
c5746323feb5767de7ca29e232458386f5699e21c013d714e37acb6b77bd824a
-
SHA512
a9f10cc7946bdb1901b2e0dfb8eced2e5c1947d1c24525036f6120de479c4ff13cfd917bcda3f3b148f931056ad021204e63bfa59194981695f16f22fb4928ef
-
SSDEEP
24576:rNnYahM9SH+ZeqWiIXaowZimVhChgKvaUIdY:rNYahM9SH+ZeqzIXyJChAjm
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-