General
-
Target
FDC933039AF067D9D28C8B9784B434516FBB7E24EBDB6E977A65C93F84ECAECE
-
Size
750KB
-
Sample
221123-r2kzjadb2x
-
MD5
59f2256a6136b5a343e8767cff479bdb
-
SHA1
0174dcf3aced6df1565547147887150c7c6ccd8a
-
SHA256
fdc933039af067d9d28c8b9784b434516fbb7e24ebdb6e977a65c93f84ecaece
-
SHA512
9768f8bbb60deae7f136c900830db4ded648fa743f3cd0dea7d8b1dd5ce1888ed0489e1debd6dd569ec0309f3b49b91372da9c8b9d156222e42678976cbb872d
-
SSDEEP
12288:AIN3rDx7XXXXXXXXXXXXUXXXXXXXqXXXXXXXXFTmCpIN3rDx7XXXXXXXXXXXXUXc:Lr5XXXXXXXXXXXXUXXXXXXXqXXXXXXXi
Static task
static1
Behavioral task
behavioral1
Sample
FDC933039AF067D9D28C8B9784B434516FBB7E24EBDB6E977A65C93F84ECAECE.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
FDC933039AF067D9D28C8B9784B434516FBB7E24EBDB6E977A65C93F84ECAECE.xls
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1900392974:AAEB_yGGlWksNcNC4Dg08OgUSlmDON2w098/sendDocument
Targets
-
-
Target
FDC933039AF067D9D28C8B9784B434516FBB7E24EBDB6E977A65C93F84ECAECE
-
Size
750KB
-
MD5
59f2256a6136b5a343e8767cff479bdb
-
SHA1
0174dcf3aced6df1565547147887150c7c6ccd8a
-
SHA256
fdc933039af067d9d28c8b9784b434516fbb7e24ebdb6e977a65c93f84ecaece
-
SHA512
9768f8bbb60deae7f136c900830db4ded648fa743f3cd0dea7d8b1dd5ce1888ed0489e1debd6dd569ec0309f3b49b91372da9c8b9d156222e42678976cbb872d
-
SSDEEP
12288:AIN3rDx7XXXXXXXXXXXXUXXXXXXXqXXXXXXXXFTmCpIN3rDx7XXXXXXXXXXXXUXc:Lr5XXXXXXXXXXXXUXXXXXXXqXXXXXXXi
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-