General
-
Target
6HAA3aT4lVJeNR1.exe
-
Size
408KB
-
Sample
211020-hpsn6sgfh3
-
MD5
c54e4a0c73b7a774f087afffa441df42
-
SHA1
7fed19ee1dcf71545e8c2d0651c91a16e80c8d42
-
SHA256
8a28b3a70394fdadc19a0879c31c86ca081b5bf0def5fba4f28847c6b9d87af1
-
SHA512
9fe0dd60ee70f41b59edcc21aa674c8dcbd183aa560aceb505063fe34a70dcbcaaff0b13964d809ef26cd7fdb64d7721bd8e8a6735fb3965093de2759c4694cf
Static task
static1
Behavioral task
behavioral1
Sample
6HAA3aT4lVJeNR1.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
6HAA3aT4lVJeNR1.exe
Resource
win10-en-20211014
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1990818097:AAEwom4DVSnyX5nLZhtvlrvCnmzUsVj23cE/sendDocument
Targets
-
-
Target
6HAA3aT4lVJeNR1.exe
-
Size
408KB
-
MD5
c54e4a0c73b7a774f087afffa441df42
-
SHA1
7fed19ee1dcf71545e8c2d0651c91a16e80c8d42
-
SHA256
8a28b3a70394fdadc19a0879c31c86ca081b5bf0def5fba4f28847c6b9d87af1
-
SHA512
9fe0dd60ee70f41b59edcc21aa674c8dcbd183aa560aceb505063fe34a70dcbcaaff0b13964d809ef26cd7fdb64d7721bd8e8a6735fb3965093de2759c4694cf
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-