General
-
Target
9ccf3e88f8c5dfd642742da82099cbcaa95af5b91cdabd24eba4074fad8e26a2
-
Size
688KB
-
Sample
240612-cmg7rsyejj
-
MD5
d27faa44bd1b3f34c47a56348838d8da
-
SHA1
0e386a5eccccfb30e5ce791c6ebfd035d8e809c8
-
SHA256
9ccf3e88f8c5dfd642742da82099cbcaa95af5b91cdabd24eba4074fad8e26a2
-
SHA512
af969030744027fc784571e12c76bf5c68f70c12d6f8bc6c6594d044581e6a470a9f61da0ca7da5bd8d9d3991fb90b22c9ff51cb5171ebd0b8e73425b592d7d0
-
SSDEEP
12288:Gj7ECdBtiMqi2vDtZhXHQcPa66t0slF7U1zmHC+uQ+y7HhgbazsItcYg2iN:GlBrqicDdXwky0sl5U1SHC+uQP1lc91
Static task
static1
Behavioral task
behavioral1
Sample
9ccf3e88f8c5dfd642742da82099cbcaa95af5b91cdabd24eba4074fad8e26a2.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
9ccf3e88f8c5dfd642742da82099cbcaa95af5b91cdabd24eba4074fad8e26a2.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7359374737:AAG-rOISO45emTAbe0uNq-VCZDJy_nNcEtc/
Targets
-
-
Target
9ccf3e88f8c5dfd642742da82099cbcaa95af5b91cdabd24eba4074fad8e26a2
-
Size
688KB
-
MD5
d27faa44bd1b3f34c47a56348838d8da
-
SHA1
0e386a5eccccfb30e5ce791c6ebfd035d8e809c8
-
SHA256
9ccf3e88f8c5dfd642742da82099cbcaa95af5b91cdabd24eba4074fad8e26a2
-
SHA512
af969030744027fc784571e12c76bf5c68f70c12d6f8bc6c6594d044581e6a470a9f61da0ca7da5bd8d9d3991fb90b22c9ff51cb5171ebd0b8e73425b592d7d0
-
SSDEEP
12288:Gj7ECdBtiMqi2vDtZhXHQcPa66t0slF7U1zmHC+uQ+y7HhgbazsItcYg2iN:GlBrqicDdXwky0sl5U1SHC+uQP1lc91
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-