General
-
Target
2d73db620c8e9011678f6883f0c7b99be35b8637b3cbb65d802031c9239f8190
-
Size
952KB
-
Sample
221209-cly4wsca94
-
MD5
4511a996d718049dc61099e20d9d493a
-
SHA1
90c7eddf78f3adee3dd32857ac566514c1214403
-
SHA256
2d73db620c8e9011678f6883f0c7b99be35b8637b3cbb65d802031c9239f8190
-
SHA512
c0ec9c7dca190b1e0363413bea7a550ce84901535c762c397aaea6e239c3370ac774827c17da8fcce9a0a53d097e34526de3f4570aeeee16662cb0c55474d605
-
SSDEEP
12288:Z9qKPtfbn0yqv+ibXxoyxsUokK6NBi82U8NH92Yhvtoz+89:LVfb++gAkK6TbaNH91hvKz+
Static task
static1
Behavioral task
behavioral1
Sample
2d73db620c8e9011678f6883f0c7b99be35b8637b3cbb65d802031c9239f8190.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2d73db620c8e9011678f6883f0c7b99be35b8637b3cbb65d802031c9239f8190.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5160627201:AAFqhXgzctTZMSuR7dIpLe50dmHi1xpPyYQ/sendDocument
Targets
-
-
Target
2d73db620c8e9011678f6883f0c7b99be35b8637b3cbb65d802031c9239f8190
-
Size
952KB
-
MD5
4511a996d718049dc61099e20d9d493a
-
SHA1
90c7eddf78f3adee3dd32857ac566514c1214403
-
SHA256
2d73db620c8e9011678f6883f0c7b99be35b8637b3cbb65d802031c9239f8190
-
SHA512
c0ec9c7dca190b1e0363413bea7a550ce84901535c762c397aaea6e239c3370ac774827c17da8fcce9a0a53d097e34526de3f4570aeeee16662cb0c55474d605
-
SSDEEP
12288:Z9qKPtfbn0yqv+ibXxoyxsUokK6NBi82U8NH92Yhvtoz+89:LVfb++gAkK6TbaNH91hvKz+
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-