General
-
Target
4a61ccfd8a35a2d1b270bd04182b50e200fcf9f145700b109943999b3c32142b.exe
-
Size
745KB
-
Sample
221207-q2zbgsfa83
-
MD5
5dd636123315e45b7ce51b6c1ba0a6e1
-
SHA1
1982fdbe597093318d832e0e89bf6ac04ecb2ee8
-
SHA256
4a61ccfd8a35a2d1b270bd04182b50e200fcf9f145700b109943999b3c32142b
-
SHA512
d86d4eaa9a47e8fcbdb2068a1c58114b13c6dd6e1c30b29b9fd476010f8eaa611db3aa728d5b033f34b18229bd64b76e2a4db462597476617a0a0fc97986cb42
-
SSDEEP
12288:kgBnM33302IgFJN0V3foOHDSUBSZuGzmfCMeAckzNPGKv0emaXmxcjZnbCkI:bBnG30YCoOHDsuKmfNmK8ebXmSjZnbCx
Static task
static1
Behavioral task
behavioral1
Sample
4a61ccfd8a35a2d1b270bd04182b50e200fcf9f145700b109943999b3c32142b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4a61ccfd8a35a2d1b270bd04182b50e200fcf9f145700b109943999b3c32142b.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5569258287:AAE8No64yGhQk8i1FTouXIrVCiNf0VgntYI/sendDocument
Targets
-
-
Target
4a61ccfd8a35a2d1b270bd04182b50e200fcf9f145700b109943999b3c32142b.exe
-
Size
745KB
-
MD5
5dd636123315e45b7ce51b6c1ba0a6e1
-
SHA1
1982fdbe597093318d832e0e89bf6ac04ecb2ee8
-
SHA256
4a61ccfd8a35a2d1b270bd04182b50e200fcf9f145700b109943999b3c32142b
-
SHA512
d86d4eaa9a47e8fcbdb2068a1c58114b13c6dd6e1c30b29b9fd476010f8eaa611db3aa728d5b033f34b18229bd64b76e2a4db462597476617a0a0fc97986cb42
-
SSDEEP
12288:kgBnM33302IgFJN0V3foOHDSUBSZuGzmfCMeAckzNPGKv0emaXmxcjZnbCkI:bBnG30YCoOHDsuKmfNmK8ebXmSjZnbCx
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-