General
-
Target
551b32ab011bbc51c79342794c4e7ed9.bin
-
Size
745KB
-
Sample
240613-bzmgkstajk
-
MD5
ef1af3be6ff90e9c929458db5ab1b50e
-
SHA1
18c4fe6d36888a774b0d6373243dc0c19f9abd9c
-
SHA256
755bf80cb6a0b7521174701b9a8c1e126d84e3e789cd41152bc27a3fa5e1bf1f
-
SHA512
47d19e712c5d5c856672a6709bc52cecc3ed9ef03a6245f5c0c48295c6b3af73c4b1c6fdcf7d800ef775d01072727fb0cbb9b40f886679f30e9909a45d182c31
-
SSDEEP
12288:NXE0ptir8h8M3aQ+tSKwt+PcMb0zzFL8XP+elbNxIzo8uWFqm/kda7uoSFFa3Yer:BXtig84YtSKwMPj6FMP+QbNOnpq417L/
Static task
static1
Behavioral task
behavioral1
Sample
0ed75cc87008a5c3fc4b70fccabd2856cc16d062d9103ad5f587bec92c58cea0.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0ed75cc87008a5c3fc4b70fccabd2856cc16d062d9103ad5f587bec92c58cea0.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7274505044:AAHb_DyajG8TPY5j1pzNE8xKK33E90Tdt4o/
Targets
-
-
Target
0ed75cc87008a5c3fc4b70fccabd2856cc16d062d9103ad5f587bec92c58cea0.exe
-
Size
1.0MB
-
MD5
551b32ab011bbc51c79342794c4e7ed9
-
SHA1
78aaf1a95847c2fdd7b78ca0fc21f92ac3f9673b
-
SHA256
0ed75cc87008a5c3fc4b70fccabd2856cc16d062d9103ad5f587bec92c58cea0
-
SHA512
2eae567cae356836ded6554571e34839e57c87dbd06da66b92bff5387688c7056a5d15a82ef0b2f102fd6c9a2ba333bcc9d351476a8e0af9847f9b8f3944696f
-
SSDEEP
24576:ug61jjk0LAta9AskDIf+xYa4bVTHoR7qiYHQGPdnlEeZ6ZDwx2a:RHxYfp+KzPdn+KDka
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-