General
-
Target
c7f6f61affdabbd30c62342d684de0fe536ff61c3924a0c36eee3cc640c48505
-
Size
588KB
-
Sample
240429-bdmv8ade59
-
MD5
14eb0ebf7cd5e84417b7fc757b36ea82
-
SHA1
cce3f551be8e39f68c7af147b6d09d4d5e2677e2
-
SHA256
c7f6f61affdabbd30c62342d684de0fe536ff61c3924a0c36eee3cc640c48505
-
SHA512
ec3ccd0e22f060baa6ab4cd30af5693503d889844be763d3da0146069145cb972ebdedcb7a023e889e5d4755e3c8da7ff65d5a2de05b024dfc2c244f0eb98294
-
SSDEEP
12288:Dg8tD+p1h79i/DdVedE5fJD7uwkQenPIHP/DWKXQ:DgwVDdcE5fJjr0
Static task
static1
Behavioral task
behavioral1
Sample
c7f6f61affdabbd30c62342d684de0fe536ff61c3924a0c36eee3cc640c48505.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c7f6f61affdabbd30c62342d684de0fe536ff61c3924a0c36eee3cc640c48505.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1981857928:AAH1InJNv_BqMV393C_6vOdRVnM6SXDwuJc/sendDocument
Targets
-
-
Target
c7f6f61affdabbd30c62342d684de0fe536ff61c3924a0c36eee3cc640c48505
-
Size
588KB
-
MD5
14eb0ebf7cd5e84417b7fc757b36ea82
-
SHA1
cce3f551be8e39f68c7af147b6d09d4d5e2677e2
-
SHA256
c7f6f61affdabbd30c62342d684de0fe536ff61c3924a0c36eee3cc640c48505
-
SHA512
ec3ccd0e22f060baa6ab4cd30af5693503d889844be763d3da0146069145cb972ebdedcb7a023e889e5d4755e3c8da7ff65d5a2de05b024dfc2c244f0eb98294
-
SSDEEP
12288:Dg8tD+p1h79i/DdVedE5fJD7uwkQenPIHP/DWKXQ:DgwVDdcE5fJjr0
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Suspicious use of SetThreadContext
-