General
-
Target
4715c0d2d1bd9aa078ba2f84097c4e764d72e54c0a165f4e82d15b339d62a9c0
-
Size
1.7MB
-
Sample
250112-bhmq1syjct
-
MD5
78b2f84b68dfe3dc124955e7b8dc8177
-
SHA1
07916d55afe705476dd906485172482870609f08
-
SHA256
4715c0d2d1bd9aa078ba2f84097c4e764d72e54c0a165f4e82d15b339d62a9c0
-
SHA512
5c6fe659ba83444987c1a88ce3cc9bdc827e5bb6f6350cb2d9728c9e263a30b1cbdeacbd73a46284961fd5364097a3723d25ab5e2633156b06e7ff8aa12c92a2
-
SSDEEP
49152:pVL5gaDIQRWsAjb3mnkFxZSuJjLoyEkmZ9Y14:3rW2nknZJ6A
Static task
static1
Behavioral task
behavioral1
Sample
4715c0d2d1bd9aa078ba2f84097c4e764d72e54c0a165f4e82d15b339d62a9c0.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
4715c0d2d1bd9aa078ba2f84097c4e764d72e54c0a165f4e82d15b339d62a9c0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1075887334303748266/u8Nrxb0SNd0-_hLZmle74zb3s1_g7nazO4AFHWQ-xeAnmWLI8dX4hffXPdxsWEWxdEMM
Targets
-
-
Target
4715c0d2d1bd9aa078ba2f84097c4e764d72e54c0a165f4e82d15b339d62a9c0
-
Size
1.7MB
-
MD5
78b2f84b68dfe3dc124955e7b8dc8177
-
SHA1
07916d55afe705476dd906485172482870609f08
-
SHA256
4715c0d2d1bd9aa078ba2f84097c4e764d72e54c0a165f4e82d15b339d62a9c0
-
SHA512
5c6fe659ba83444987c1a88ce3cc9bdc827e5bb6f6350cb2d9728c9e263a30b1cbdeacbd73a46284961fd5364097a3723d25ab5e2633156b06e7ff8aa12c92a2
-
SSDEEP
49152:pVL5gaDIQRWsAjb3mnkFxZSuJjLoyEkmZ9Y14:3rW2nknZJ6A
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-