General
-
Target
a36bc70d145a83e7029a0b712a80a0240d7dd4536eb07ad21b5151b803785971
-
Size
868KB
-
Sample
221012-t4rk7sbgd6
-
MD5
28e39417746ef6b096db829021bf4d37
-
SHA1
648e930721093eef9da3d75cdb1d75b81d4d3fe6
-
SHA256
a36bc70d145a83e7029a0b712a80a0240d7dd4536eb07ad21b5151b803785971
-
SHA512
241e699f86dfb894f8e9aa93ca0dddc11d465e7a0cca51369451384580e0318a2e210fab4802987969c85274c843107542fc6b4834888db39788aa51c55d258d
-
SSDEEP
24576:lCbBNOTG2zroD3CtzNOZuNlUH87oHbMj:yGySsCtpO8NlC7
Static task
static1
Behavioral task
behavioral1
Sample
a36bc70d145a83e7029a0b712a80a0240d7dd4536eb07ad21b5151b803785971.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a36bc70d145a83e7029a0b712a80a0240d7dd4536eb07ad21b5151b803785971.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5486404138:AAGTJuWzOAVJUs872Z8j0ytl0Xc6M51Ldfs/sendDocument
Targets
-
-
Target
a36bc70d145a83e7029a0b712a80a0240d7dd4536eb07ad21b5151b803785971
-
Size
868KB
-
MD5
28e39417746ef6b096db829021bf4d37
-
SHA1
648e930721093eef9da3d75cdb1d75b81d4d3fe6
-
SHA256
a36bc70d145a83e7029a0b712a80a0240d7dd4536eb07ad21b5151b803785971
-
SHA512
241e699f86dfb894f8e9aa93ca0dddc11d465e7a0cca51369451384580e0318a2e210fab4802987969c85274c843107542fc6b4834888db39788aa51c55d258d
-
SSDEEP
24576:lCbBNOTG2zroD3CtzNOZuNlUH87oHbMj:yGySsCtpO8NlC7
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-