General
-
Target
f1c0ce5d37364862798e7e11817f3544d72847e1bffd46723f51df8504796afd
-
Size
319KB
-
Sample
230206-rewshshe4y
-
MD5
0494a68d7135560a50c02f4c4b6ad18f
-
SHA1
84338aa1637299d93358f0e1d842932358d07093
-
SHA256
f1c0ce5d37364862798e7e11817f3544d72847e1bffd46723f51df8504796afd
-
SHA512
f5b5af135ee9b69a9e9ec740cd8d2cdac082b8dcc0a7cb81168076f849632c7423c845e998dd7c77b164bba2f08fadd434adae280aa8717f19baac359c7601bd
-
SSDEEP
6144:vYa6nfiMr0Cxya0QuwyhA0AUZOE7Zj50ZUonaM4O2im59x+skSCR0/rEOh:vY9FyavQA4wE7Zj5dyaM4O2im59L/CRY
Static task
static1
Behavioral task
behavioral1
Sample
f1c0ce5d37364862798e7e11817f3544d72847e1bffd46723f51df8504796afd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f1c0ce5d37364862798e7e11817f3544d72847e1bffd46723f51df8504796afd.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1060497255888605185/YygDHRiwYqCp3BheuMa5Zliz-2yRI2G-aeR8nFUp8XCSIhCp4S0uU66B1TLkMA0rIykw
Targets
-
-
Target
f1c0ce5d37364862798e7e11817f3544d72847e1bffd46723f51df8504796afd
-
Size
319KB
-
MD5
0494a68d7135560a50c02f4c4b6ad18f
-
SHA1
84338aa1637299d93358f0e1d842932358d07093
-
SHA256
f1c0ce5d37364862798e7e11817f3544d72847e1bffd46723f51df8504796afd
-
SHA512
f5b5af135ee9b69a9e9ec740cd8d2cdac082b8dcc0a7cb81168076f849632c7423c845e998dd7c77b164bba2f08fadd434adae280aa8717f19baac359c7601bd
-
SSDEEP
6144:vYa6nfiMr0Cxya0QuwyhA0AUZOE7Zj50ZUonaM4O2im59x+skSCR0/rEOh:vY9FyavQA4wE7Zj5dyaM4O2im59L/CRY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-