General
-
Target
f73f8e208a1920512e2901a54d5907a10d1dfb7fcbe101a7bdee3971460c866e
-
Size
2.3MB
-
Sample
250123-bm4v4awlcl
-
MD5
957ed991a2f4e85db4dbda7130ce56dc
-
SHA1
1420f36644d36748adb1b5cfe6aa33aa3971fd52
-
SHA256
f73f8e208a1920512e2901a54d5907a10d1dfb7fcbe101a7bdee3971460c866e
-
SHA512
eb9f6e3038245119f8436316fa52e3d4f4551928b5120aafd7c42303b137769721dfac5140f5b282444b10824cc046e6e9d835627a335288a52ded886548ccb1
-
SSDEEP
24576:FOwZOF4dytQN1rETCNG+IzY8AAloY+GNtWuW03QbDAw3WfYtNhPu:oSOmdytQN1rEmqiAl9+GHWuV8sZYtN
Static task
static1
Behavioral task
behavioral1
Sample
f73f8e208a1920512e2901a54d5907a10d1dfb7fcbe101a7bdee3971460c866e.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7351654760:AAFbpZoZSrKZKoCJV2by7hbyBL3xnGEoUrU/
Targets
-
-
Target
f73f8e208a1920512e2901a54d5907a10d1dfb7fcbe101a7bdee3971460c866e
-
Size
2.3MB
-
MD5
957ed991a2f4e85db4dbda7130ce56dc
-
SHA1
1420f36644d36748adb1b5cfe6aa33aa3971fd52
-
SHA256
f73f8e208a1920512e2901a54d5907a10d1dfb7fcbe101a7bdee3971460c866e
-
SHA512
eb9f6e3038245119f8436316fa52e3d4f4551928b5120aafd7c42303b137769721dfac5140f5b282444b10824cc046e6e9d835627a335288a52ded886548ccb1
-
SSDEEP
24576:FOwZOF4dytQN1rETCNG+IzY8AAloY+GNtWuW03QbDAw3WfYtNhPu:oSOmdytQN1rEmqiAl9+GHWuV8sZYtN
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-