General
-
Target
qz213kxyuSGYghq.exe
-
Size
414KB
-
Sample
211020-hqdawahffl
-
MD5
8a9d1529717c2a1439c582d43e3bbae6
-
SHA1
895ac5ef5fb7aa13f12833c72f340c3b7d2529a9
-
SHA256
e08f1ec1f7e589e8951e895654e7a4dd75423026415ded2040f363c5ca29a6c2
-
SHA512
be31ee771e1215e1d561df81d267488261d54a2fae30751a4afc0362a0d247660a2ea9e111da77a9cc72491486ead28a9e7f7001ee1c52cc0b5b668f5a4f9e46
Static task
static1
Behavioral task
behavioral1
Sample
qz213kxyuSGYghq.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
qz213kxyuSGYghq.exe
Resource
win10-en-20211014
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1990818097:AAEwom4DVSnyX5nLZhtvlrvCnmzUsVj23cE/sendDocument
Targets
-
-
Target
qz213kxyuSGYghq.exe
-
Size
414KB
-
MD5
8a9d1529717c2a1439c582d43e3bbae6
-
SHA1
895ac5ef5fb7aa13f12833c72f340c3b7d2529a9
-
SHA256
e08f1ec1f7e589e8951e895654e7a4dd75423026415ded2040f363c5ca29a6c2
-
SHA512
be31ee771e1215e1d561df81d267488261d54a2fae30751a4afc0362a0d247660a2ea9e111da77a9cc72491486ead28a9e7f7001ee1c52cc0b5b668f5a4f9e46
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-