General
-
Target
d8df180f1f880ef3d7d0066d76d717bec1bfb74073765895c4192895abc57d26
-
Size
532KB
-
Sample
210926-2p8vyafchj
-
MD5
54d4818b7b9b23930120c8673c706d13
-
SHA1
c36c7ecd843f2f46c2157d0d1e82bb90cc329dfa
-
SHA256
d8df180f1f880ef3d7d0066d76d717bec1bfb74073765895c4192895abc57d26
-
SHA512
e2c1de8b3f364f50e9ef37bce339bad66c68c2b7de5e42c57e80d7e842160e22c783b9da362ccf6b1d47b0c121b0c20142e2f68ea462f9bfd0cb310f7d4f1295
Static task
static1
Behavioral task
behavioral1
Sample
d8df180f1f880ef3d7d0066d76d717bec1bfb74073765895c4192895abc57d26.exe
Resource
win10-en-20210920
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot2011876152:AAE2-KS2icrnTIfs2BShfFL-azbHdJ_0afc/sendDocument
Targets
-
-
Target
d8df180f1f880ef3d7d0066d76d717bec1bfb74073765895c4192895abc57d26
-
Size
532KB
-
MD5
54d4818b7b9b23930120c8673c706d13
-
SHA1
c36c7ecd843f2f46c2157d0d1e82bb90cc329dfa
-
SHA256
d8df180f1f880ef3d7d0066d76d717bec1bfb74073765895c4192895abc57d26
-
SHA512
e2c1de8b3f364f50e9ef37bce339bad66c68c2b7de5e42c57e80d7e842160e22c783b9da362ccf6b1d47b0c121b0c20142e2f68ea462f9bfd0cb310f7d4f1295
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-