General
-
Target
5c571a20aef5d31ad3edbfd65e33540201dde1f9ccf5eaae84332f1bf1e09ea2.exe
-
Size
890KB
-
Sample
230105-q74hdscb83
-
MD5
852b20b7affadeb7d7d6b4a88c2355b5
-
SHA1
a8ec160119ea5c5a2f6b79de1d611a5c45f4d248
-
SHA256
5c571a20aef5d31ad3edbfd65e33540201dde1f9ccf5eaae84332f1bf1e09ea2
-
SHA512
eb72ac6932f74b0843dbcf9401e2efafd265154e7bc47b49a4e34dc2025c066ba29d0c17d7fdec79c80d717f52e7c1d6646f0e4452b6861a4adee0952baf58e8
-
SSDEEP
12288:RoQgKZ/nXt7virmWhlGLaQYIYvFW67gl89/r2AXyRh+DITnAIuJS6RXpRALqUpjl:qu8RKh+DyAI6pCLD
Static task
static1
Behavioral task
behavioral1
Sample
5c571a20aef5d31ad3edbfd65e33540201dde1f9ccf5eaae84332f1bf1e09ea2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5c571a20aef5d31ad3edbfd65e33540201dde1f9ccf5eaae84332f1bf1e09ea2.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1360033246:AAF6H8m6YrL09doyxtsvJzZ_cIl__BCF4aU/sendDocument
Targets
-
-
Target
5c571a20aef5d31ad3edbfd65e33540201dde1f9ccf5eaae84332f1bf1e09ea2.exe
-
Size
890KB
-
MD5
852b20b7affadeb7d7d6b4a88c2355b5
-
SHA1
a8ec160119ea5c5a2f6b79de1d611a5c45f4d248
-
SHA256
5c571a20aef5d31ad3edbfd65e33540201dde1f9ccf5eaae84332f1bf1e09ea2
-
SHA512
eb72ac6932f74b0843dbcf9401e2efafd265154e7bc47b49a4e34dc2025c066ba29d0c17d7fdec79c80d717f52e7c1d6646f0e4452b6861a4adee0952baf58e8
-
SSDEEP
12288:RoQgKZ/nXt7virmWhlGLaQYIYvFW67gl89/r2AXyRh+DITnAIuJS6RXpRALqUpjl:qu8RKh+DyAI6pCLD
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-