General
-
Target
28ad82f50d7d245ebb8fc04eaec2a07ef3e4a52b16c7c1ef0a3b69685f28ef88
-
Size
541KB
-
Sample
230309-kkl2yaad5z
-
MD5
25205c118eaea0984925098bdb17c459
-
SHA1
a4c43589bb14419365479f6e6ec208d02dcdc3eb
-
SHA256
28ad82f50d7d245ebb8fc04eaec2a07ef3e4a52b16c7c1ef0a3b69685f28ef88
-
SHA512
a052251bf7828451cced877d1f7d51a91105374d6c361a0651441f85a957c3c1840fbb9a35a9eb9fa50a16ee4731b525d0ca1d722bce5d812b9edd2129ba7e7c
-
SSDEEP
12288:6YsLcPESBHDTc7EplPQfSROOT6Y48FBlQ8gghasSaAJ/Gug+Yrh6:6Y4cPdHU78lPQfSAWf3Q8gyAZ/EjF6
Static task
static1
Behavioral task
behavioral1
Sample
28ad82f50d7d245ebb8fc04eaec2a07ef3e4a52b16c7c1ef0a3b69685f28ef88.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
28ad82f50d7d245ebb8fc04eaec2a07ef3e4a52b16c7c1ef0a3b69685f28ef88.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5731015181:AAEnN7QEEeN_fBCr0YFv_H7lrNpKS_lkspI/sendDocument
Targets
-
-
Target
28ad82f50d7d245ebb8fc04eaec2a07ef3e4a52b16c7c1ef0a3b69685f28ef88
-
Size
541KB
-
MD5
25205c118eaea0984925098bdb17c459
-
SHA1
a4c43589bb14419365479f6e6ec208d02dcdc3eb
-
SHA256
28ad82f50d7d245ebb8fc04eaec2a07ef3e4a52b16c7c1ef0a3b69685f28ef88
-
SHA512
a052251bf7828451cced877d1f7d51a91105374d6c361a0651441f85a957c3c1840fbb9a35a9eb9fa50a16ee4731b525d0ca1d722bce5d812b9edd2129ba7e7c
-
SSDEEP
12288:6YsLcPESBHDTc7EplPQfSROOT6Y48FBlQ8gghasSaAJ/Gug+Yrh6:6Y4cPdHU78lPQfSAWf3Q8gyAZ/EjF6
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-