General
-
Target
Zag7baiAIOkdqsl.exe
-
Size
1.0MB
-
Sample
220930-f69mxadebp
-
MD5
0854e6384e488eb41333cc04e6771a9c
-
SHA1
769f0c4b367c442ab0976fe91eef035a5299600a
-
SHA256
ea1bcb7a814c69463a8d4f24162e0f228600287b74c7fbddfafa0f1972670e24
-
SHA512
413bcfa312f58679d9bf942d2f3895c4270a5604e9cda68ca2895dfa7a6102fc6c691ac2165ef9f1ad9fd8f4dda2d468f07d883955baf08f9eeaf0cf4272bd41
-
SSDEEP
12288:AAeY2iNw0+9MKcAJsSPoSRruT+s0jdKNBe/qjJ5nWMD65B4wIKhxGS+s6gdZxJ:AAJ1Ie6nwSRruT+bAhjrW
Static task
static1
Behavioral task
behavioral1
Sample
Zag7baiAIOkdqsl.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Zag7baiAIOkdqsl.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5015424630:AAHYFU1sKtYqSORHBErFCWNjJz1TpXKj30w/sendDocument
Targets
-
-
Target
Zag7baiAIOkdqsl.exe
-
Size
1.0MB
-
MD5
0854e6384e488eb41333cc04e6771a9c
-
SHA1
769f0c4b367c442ab0976fe91eef035a5299600a
-
SHA256
ea1bcb7a814c69463a8d4f24162e0f228600287b74c7fbddfafa0f1972670e24
-
SHA512
413bcfa312f58679d9bf942d2f3895c4270a5604e9cda68ca2895dfa7a6102fc6c691ac2165ef9f1ad9fd8f4dda2d468f07d883955baf08f9eeaf0cf4272bd41
-
SSDEEP
12288:AAeY2iNw0+9MKcAJsSPoSRruT+s0jdKNBe/qjJ5nWMD65B4wIKhxGS+s6gdZxJ:AAJ1Ie6nwSRruT+bAhjrW
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-