General
-
Target
f20bef5379fa7ef61271c9b73a3d324b998daadb24e9d3c3e3945af30599b6b9
-
Size
1.4MB
-
Sample
250123-bkjgdavlfw
-
MD5
d0eeefd75cb5573f52dc3140ebdd7fd8
-
SHA1
d91c2c105265b3659afe7d0512942db0b84b7673
-
SHA256
f20bef5379fa7ef61271c9b73a3d324b998daadb24e9d3c3e3945af30599b6b9
-
SHA512
1c20ead97a91d86065bb5994f885001a582fa47ea4ea20cdb39a1b10c8393283a265522c2253686d0ffc45030bd000061236e86e8d436755347bf3b67c4a9999
-
SSDEEP
24576:76aOdKRRPWEeeRS46SFtWcukfYblAwzWfm5N7Q:76a8KgeRN6S/WcTMulm5NE
Static task
static1
Behavioral task
behavioral1
Sample
Statement Of Account/Statement Of Account.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7351654760:AAFbpZoZSrKZKoCJV2by7hbyBL3xnGEoUrU/
Targets
-
-
Target
Statement Of Account/Statement Of Account.exe
-
Size
2.3MB
-
MD5
957ed991a2f4e85db4dbda7130ce56dc
-
SHA1
1420f36644d36748adb1b5cfe6aa33aa3971fd52
-
SHA256
f73f8e208a1920512e2901a54d5907a10d1dfb7fcbe101a7bdee3971460c866e
-
SHA512
eb9f6e3038245119f8436316fa52e3d4f4551928b5120aafd7c42303b137769721dfac5140f5b282444b10824cc046e6e9d835627a335288a52ded886548ccb1
-
SSDEEP
24576:FOwZOF4dytQN1rETCNG+IzY8AAloY+GNtWuW03QbDAw3WfYtNhPu:oSOmdytQN1rEmqiAl9+GHWuV8sZYtN
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-