General
-
Target
dc6fa89d93f4e7aa0da35a1ec6b3e05d211325974a9e08beaa0a521653897f1c
-
Size
1.7MB
-
Sample
250129-br2arswqa1
-
MD5
72e07ec26f886b593179c6bde218541f
-
SHA1
4b2342ef771faaa5c4a488309c62406cabf3b463
-
SHA256
dc6fa89d93f4e7aa0da35a1ec6b3e05d211325974a9e08beaa0a521653897f1c
-
SHA512
8d2df2a654b7afdfe6d7816c9f8384d69b3ccd3dddf2cd04bb4b527d7fbc901ee6a353b993dec64c0c589b2b0fc9ff1bb119e729cabc868955f8443ac8702d8e
-
SSDEEP
24576:ISexfdrvysXV1HWmwWOs/X3sf/Xq7TYA2rQtlHPI4af:1MHWIOyYzQB
Static task
static1
Behavioral task
behavioral1
Sample
dc6fa89d93f4e7aa0da35a1ec6b3e05d211325974a9e08beaa0a521653897f1c.exe
Resource
win7-20241010-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7351654760:AAFbpZoZSrKZKoCJV2by7hbyBL3xnGEoUrU/
Targets
-
-
Target
dc6fa89d93f4e7aa0da35a1ec6b3e05d211325974a9e08beaa0a521653897f1c
-
Size
1.7MB
-
MD5
72e07ec26f886b593179c6bde218541f
-
SHA1
4b2342ef771faaa5c4a488309c62406cabf3b463
-
SHA256
dc6fa89d93f4e7aa0da35a1ec6b3e05d211325974a9e08beaa0a521653897f1c
-
SHA512
8d2df2a654b7afdfe6d7816c9f8384d69b3ccd3dddf2cd04bb4b527d7fbc901ee6a353b993dec64c0c589b2b0fc9ff1bb119e729cabc868955f8443ac8702d8e
-
SSDEEP
24576:ISexfdrvysXV1HWmwWOs/X3sf/Xq7TYA2rQtlHPI4af:1MHWIOyYzQB
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-