General
-
Target
#$$$!1weF5(1).exe
-
Size
662KB
-
Sample
210727-2vrrv9jlfn
-
MD5
65c520abdacd8aacdb7f93ed7b00d716
-
SHA1
c5ca68ab7ce2e46e0b924acb0365af5f4935847d
-
SHA256
b47c11b0e48a16e4e1d861dcb524bf3bcabfe1481853b7d94fb738f635d1d5aa
-
SHA512
f369b973656103610c08a054ae50a3ddcccc9aa64acfc9fec9d6e06b5f6cd3d5e3ca2d7b62eda5838452efd0bed8f25f8a9cb9fe430c9ec39749181e24be93ed
Static task
static1
Behavioral task
behavioral1
Sample
#$$$!1weF5(1).exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
#$$$!1weF5(1).exe
Resource
win10v20210408
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1815802853:AAFwTZ6mRU-UOmcTcCR8glZAAkNmzHpMkL8/sendDocument
Targets
-
-
Target
#$$$!1weF5(1).exe
-
Size
662KB
-
MD5
65c520abdacd8aacdb7f93ed7b00d716
-
SHA1
c5ca68ab7ce2e46e0b924acb0365af5f4935847d
-
SHA256
b47c11b0e48a16e4e1d861dcb524bf3bcabfe1481853b7d94fb738f635d1d5aa
-
SHA512
f369b973656103610c08a054ae50a3ddcccc9aa64acfc9fec9d6e06b5f6cd3d5e3ca2d7b62eda5838452efd0bed8f25f8a9cb9fe430c9ec39749181e24be93ed
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-