General
-
Target
#4WIa5.exe
-
Size
1.1MB
-
Sample
221206-hnpacsdb79
-
MD5
8c9cf2d7436c524449d3559a379a9b7d
-
SHA1
519ff74cb97229a1b1fd7c5515b165cf30472e28
-
SHA256
1e71e56913f6531c96445bc90b51d49e9a69574236d97b3c36ce99db4f9a9ee7
-
SHA512
bc6ba9da565af95854e77e1ed10019f29c50f35ba438b0dfa4fc073f9cb1f5e80f6522cce11e8cf25c368e6ffed3173a531d1683d8d87278782ff2f8b8c351ef
-
SSDEEP
24576:9g7yqlK/1FuZ7zNrQ5DQRQFs0TZ7yw+mD:u7yLDkVrQ5ysTB9JD
Static task
static1
Behavioral task
behavioral1
Sample
#4WIa5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
#4WIa5.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1591373451:AAH6Q2mvjdA9146Wl0khv2-kuh-iTps2zjw/
Targets
-
-
Target
#4WIa5.exe
-
Size
1.1MB
-
MD5
8c9cf2d7436c524449d3559a379a9b7d
-
SHA1
519ff74cb97229a1b1fd7c5515b165cf30472e28
-
SHA256
1e71e56913f6531c96445bc90b51d49e9a69574236d97b3c36ce99db4f9a9ee7
-
SHA512
bc6ba9da565af95854e77e1ed10019f29c50f35ba438b0dfa4fc073f9cb1f5e80f6522cce11e8cf25c368e6ffed3173a531d1683d8d87278782ff2f8b8c351ef
-
SSDEEP
24576:9g7yqlK/1FuZ7zNrQ5DQRQFs0TZ7yw+mD:u7yLDkVrQ5ysTB9JD
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-