General
-
Target
8b6f40d327d8f0c89cb9223840a3ae15c06bd4b7ae43a613ea619a04ba2441ac
-
Size
758KB
-
Sample
220414-pw4hkscba3
-
MD5
c6e01fce47d2f5e46ddb65f389d48e35
-
SHA1
af7b46434020214b9337dcb71a6174780610b30a
-
SHA256
8b6f40d327d8f0c89cb9223840a3ae15c06bd4b7ae43a613ea619a04ba2441ac
-
SHA512
1f9cfe322672ea30d752b20761c0968fd8c20742608ea70cf7fc71eda19ae729e1a085fe1eac450dcb0bcb665f4c2648d24c592267019bef01d3aa311f511e5a
Static task
static1
Behavioral task
behavioral1
Sample
8b6f40d327d8f0c89cb9223840a3ae15c06bd4b7ae43a613ea619a04ba2441ac.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
8b6f40d327d8f0c89cb9223840a3ae15c06bd4b7ae43a613ea619a04ba2441ac.exe
Resource
win10v2004-20220331-en
Malware Config
Extracted
agenttesla
http://malec-pompy.ml/a/inc/ed981c40cedc75.php
Targets
-
-
Target
8b6f40d327d8f0c89cb9223840a3ae15c06bd4b7ae43a613ea619a04ba2441ac
-
Size
758KB
-
MD5
c6e01fce47d2f5e46ddb65f389d48e35
-
SHA1
af7b46434020214b9337dcb71a6174780610b30a
-
SHA256
8b6f40d327d8f0c89cb9223840a3ae15c06bd4b7ae43a613ea619a04ba2441ac
-
SHA512
1f9cfe322672ea30d752b20761c0968fd8c20742608ea70cf7fc71eda19ae729e1a085fe1eac450dcb0bcb665f4c2648d24c592267019bef01d3aa311f511e5a
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Meta Stealer Stealer
Meta Stealer steals passwords stored in browsers, written in C++.
-
AgentTesla Payload
-
Suspicious use of SetThreadContext
-