General
-
Target
B308FE5CBA6335BC1EE3E1F7F2ACC5A836F5F791208475A528366EDD19ADABD9
-
Size
760KB
-
Sample
230208-v19haacg31
-
MD5
4b33f8195239e181df4b33bad3e59047
-
SHA1
4fa27e2f7a90b6e18355c98b160cecdf18426f54
-
SHA256
b308fe5cba6335bc1ee3e1f7f2acc5a836f5f791208475a528366edd19adabd9
-
SHA512
4259f458b5b4b400e6903aea74e46a8a12791e896af9ecd3c61bddea662ee8ce9949d19e87a795fa00a13e8e9544542de8fa2a3536e542e7b057c7c439dc031b
-
SSDEEP
12288:Ch/yK5U5JKVSlabiFldrzBn/9whFQb93EdRGCmUW8CnoXQNW3CnAjYq:Ch/JShxrXwhF/mJnoXQNIOAjN
Static task
static1
Behavioral task
behavioral1
Sample
HBL-TXCEB221133921.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
HBL-TXCEB221133921.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5607774642:AAHvNRvZZsOklHgBMuIBbK4hzkG26fMwVX8/
Targets
-
-
Target
HBL-TXCEB221133921.exe
-
Size
924KB
-
MD5
8cc30536cf5cb034f58101ac6c5d5f30
-
SHA1
eb4d6e97c32801948b80952311a38a34552f5e7f
-
SHA256
f2dd1ea5092a534e3f8a79a21fa0e46da7d5d3a0a71b9945a7c6278c0431b79e
-
SHA512
c42ae9b32097e3a1b00125e365e730cbe26eff4a53c3254d44cc68a06aa2a8eedea01855831519a13eb1f8db954d475dc0036c29dce43571a60de5f6062c2804
-
SSDEEP
12288:FaS45nJrTmHkFrVr/9qvDGB9HEvhACmUQ8gneXQjWl2aaqnm:oS4PkkFrjqvDPqlneXQj7im
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-