General
-
Target
5c3a2912958bff3bd0d25b141a32717f0f7c4c7b1091a263185694c2f779f3cd
-
Size
761KB
-
Sample
230308-pd1nzaff8z
-
MD5
11ecf3ab5737650035ef7e9a3c57f80a
-
SHA1
31b6aef080ee864059e8a82d8d9d2b3745578f2d
-
SHA256
5c3a2912958bff3bd0d25b141a32717f0f7c4c7b1091a263185694c2f779f3cd
-
SHA512
bc14a771bfe31ad55a29aed0f672da9805dee55f8ede8af7518980cdc244ee0c2873eb8b99b751d3c981063fafe9dcecd3b3ccbf257be6be9b199fa395cbbd1c
-
SSDEEP
12288:2dj50i653yhXyiQmHE1ODGK90f8EcgeL5KDmCxkFTmcj+f8p5:e50iE3yhXyiHE1ONe5eFKDmrFTzj+U
Static task
static1
Behavioral task
behavioral1
Sample
5c3a2912958bff3bd0d25b141a32717f0f7c4c7b1091a263185694c2f779f3cd.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5c3a2912958bff3bd0d25b141a32717f0f7c4c7b1091a263185694c2f779f3cd.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1077566111689740349/gnJjTpoCwEM3PNDQkU1Kb4C12Er7lUmsBkWDapkU4UnedFpWqrRphmnNJUx4027RyZXM
Targets
-
-
Target
5c3a2912958bff3bd0d25b141a32717f0f7c4c7b1091a263185694c2f779f3cd
-
Size
761KB
-
MD5
11ecf3ab5737650035ef7e9a3c57f80a
-
SHA1
31b6aef080ee864059e8a82d8d9d2b3745578f2d
-
SHA256
5c3a2912958bff3bd0d25b141a32717f0f7c4c7b1091a263185694c2f779f3cd
-
SHA512
bc14a771bfe31ad55a29aed0f672da9805dee55f8ede8af7518980cdc244ee0c2873eb8b99b751d3c981063fafe9dcecd3b3ccbf257be6be9b199fa395cbbd1c
-
SSDEEP
12288:2dj50i653yhXyiQmHE1ODGK90f8EcgeL5KDmCxkFTmcj+f8p5:e50iE3yhXyiHE1ONe5eFKDmrFTzj+U
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-