General
-
Target
dc88455c904d18a3c2b9b025e97c8af6.bin
-
Size
652KB
-
Sample
240608-ex1g7sgh51
-
MD5
461e781da9002490b754d148783ceebe
-
SHA1
f4b923796371ba238ea00ae5c07b5fea4a68f7e4
-
SHA256
48eef05c2fc5a87a9a0d644dc5c8da570e880dcf297c7b03a73c99386c101baa
-
SHA512
7e45c3a192b670ce1f0202d7b0da4e5b896859efb6a65682c318934cf69c793cd31545047d6d1945064704cbbe1a1172316af49b75f7cbf384db67a71251a618
-
SSDEEP
12288:Dpcjf7+KnMB5HITapdrDJhZ7YO6loMg4K/jODyQCB41kh6vMEAPFcqc8RF:Kj6OMDImpVDOnoMg4K/jwyQSvh1NdfF
Static task
static1
Behavioral task
behavioral1
Sample
0892cd1f8e39fcc175e75c553dc406819a278c39f56fe2d8236b7ef283af1125.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0892cd1f8e39fcc175e75c553dc406819a278c39f56fe2d8236b7ef283af1125.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7359374737:AAG-rOISO45emTAbe0uNq-VCZDJy_nNcEtc/
Targets
-
-
Target
0892cd1f8e39fcc175e75c553dc406819a278c39f56fe2d8236b7ef283af1125.exe
-
Size
729KB
-
MD5
dc88455c904d18a3c2b9b025e97c8af6
-
SHA1
2da1ab8da33cdee205dcdc6f56e96cf595cc23ba
-
SHA256
0892cd1f8e39fcc175e75c553dc406819a278c39f56fe2d8236b7ef283af1125
-
SHA512
ca661f2b9038847ff2df7ec9bc64e88c8467e3435989387e01d64ffba4e72ba815feffa36d8fe6ca372ac960b8e425dadeecec011eb372a9355dbfbb7ec907de
-
SSDEEP
12288:0gsJxviqyJMuPJg39tu/4Oc1/t05azP1E/HmZt/inFQhEwdLah:ap5OhPJgf1/C5azPWmz/QQhEw1a
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-